Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 8 |
Descriptor
Source
Information Systems Education… | 2 |
Online Submission | 2 |
Educational Technology &… | 1 |
International Association for… | 1 |
Journal of Information… | 1 |
Library Journal | 1 |
ProQuest LLC | 1 |
Author
Dixit, R. K. | 2 |
Babb, Jeffry S. | 1 |
Bowman, Michael | 1 |
Chen, Frankie | 1 |
Frydenberg, Mark | 1 |
McDermott, Isabelle | 1 |
McIntyre, Joshua | 1 |
OConnell, Jake | 1 |
Ogata, Hiroaki | 1 |
Pacharintanakul, Peera | 1 |
Paredes J., Rosa G. | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Collected Works - Serial | 2 |
Reports - Evaluative | 2 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Serapiglia, Anthony; Serapiglia, Constance; McIntyre, Joshua – Information Systems Education Journal, 2015
Bitcoin, Litecoin, Dogecoin, et al "cryptocurrencies" have enjoyed a meteoric rise in popularity and use as a way of performing transactions on the Internet and beyond. While gaining market valuations of billions of dollars and generating much popular press in doing so, little has been academically published on the Computer…
Descriptors: Monetary Systems, Information Technology, Information Systems, Internet
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Dixit, R. K. – Online Submission, 2010
This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…
Descriptors: Diabetes, Computers, Computer Science, Telecommunications
Ogata, Hiroaki; Saito, Nobuji A.; Paredes J., Rosa G.; San Martin, Gerardo Ayala; Yano, Yoneo – Educational Technology & Society, 2008
This paper presents the integration of ubiquitous computing systems into classroom settings, in order to provide basic support for classrooms and field activities. We have developed web application components using Java technology and configured a classroom with wireless network access and a web camera for our purposes. In this classroom, the…
Descriptors: Class Activities, Learning Activities, Computer Science, Educational Technology
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Rice, George; Bowman, Michael – Journal of Information Technology Education, 2007
Children in the back seat on a long trip are not the only ones asking the question "Are we there yet?" At Murray State University (MSU) and other universities starting new programs, the question becomes one of validation of the program. In the late 90s, MSU, a midsize university, was entrusted with the responsibility of developing a program of…
Descriptors: Information Systems, Computers, Information Technology, Computer Science
St. Lifer, Evan – Library Journal, 1997
Since its founding in 1990, the Coalition for Networked Information (CNI) has focused on publishing and accessing intellectual property. This article presents an interview with CNI's new executive director, Cliff Lynch discussing future changes, scholarly communication and the Internet, the University of California Berkeley's MELVYL, computer…
Descriptors: Computer Networks, Computer Science, Copyrights, Intellectual Property
Walker, Ellen; Rodger, Susan – 1996
The PipeLINK program seeks to attract and retain women and girls in computer science careers. Aimed at girls and women from the high school through the Ph.D. levels, the program suggests activities to aid participants at each level, connect students with role models and mentors, and provides an introduction to a wide variety of computer science…
Descriptors: Career Choice, Computer Networks, Computer Science, Computer Science Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers