Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
Information Systems Education… | 2 |
ProQuest LLC | 2 |
Association Supporting… | 1 |
Community College Journal | 1 |
International Journal of… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Education for… | 1 |
Tribal College Journal of… | 1 |
Author
Abhishek Vaish | 1 |
Agerwala, Tilak | 1 |
Babb, Jeffry S. | 1 |
Bottum, Jim | 1 |
Campbell, Wendy | 1 |
Chen, Frankie | 1 |
Frydenberg, Mark | 1 |
Grandon, Alex | 1 |
Hofmann, Russell | 1 |
Le, Meixing | 1 |
McDermott, Isabelle | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 5 |
Reports - Descriptive | 3 |
Dissertations/Theses -… | 2 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Grade 10 | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Grade 9 | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
More ▼ |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Bottum, Jim; Smith, Dale; Grandon, Alex; Hofmann, Russell – Tribal College Journal of American Indian Higher Education, 2022
For a tribal college or university (TCU), cyberinfrastructure includes not only the campus computer labs, servers, routers, and software applications, but the classroom technology, research laboratories, library facilities, and personnel who operate and maintain these resources. The cyberinfrastructure at a TCU is a foundational tool that ties the…
Descriptors: Capacity Building, Information Technology, Computer Networks, Tribally Controlled Education
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Campbell, Wendy – ProQuest LLC, 2017
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Descriptors: Internet, Information Technology, Information Security, Universities
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Le, Meixing – ProQuest LLC, 2013
In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…
Descriptors: Data, Access to Information, Computer Networks, Internet
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security