Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Source
Association of Small Computer… | 2 |
ACM Transactions on Computing… | 1 |
International Educational… | 1 |
Journal of Cybersecurity… | 1 |
Author
Archer, Ricky | 1 |
Dunn, Deborah | 1 |
Mavrikis, Manolis, Ed. | 1 |
McLaren, Bruce M., Ed. | 1 |
Pardos, Zachary, Ed. | 1 |
Qadah, Yaseen | 1 |
Smith, Peter, Ed. | 1 |
Stamper, John, Ed. | 1 |
Thitima Srivatanakul | 1 |
Vega, Percy | 1 |
Xu, Jinsheng | 1 |
More ▼ |
Publication Type
Collected Works - Proceedings | 2 |
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Elementary Education | 1 |
Grade 6 | 1 |
Intermediate Grades | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Finland | 1 |
France | 1 |
New York | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 1 |
What Works Clearinghouse Rating
Thitima Srivatanakul – Journal of Cybersecurity Education, Research and Practice, 2024
Gamification, including game-based learning (GBL), is a widely recognized pedagogical approach used for imparting and reinforcing cybersecurity knowledge and skills to learners. One innovative form of GBL gaining popularity across various educational levels, from secondary schools to professional development, is escape room-style education. This…
Descriptors: Computer Security, Problem Solving, Gamification, Undergraduate Students
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Smith, Peter, Ed. – Association of Small Computer Users in Education (ASCUE), 2009
The Association of Small Computer Users in Education (ASCUE) is a dynamic organization for people interested in small college technology issues. Its members include information technology professionals, instructional technologists, and faculty members from all over the world who use computers and technology to support teaching and learning. The…
Descriptors: Small Colleges, Information Technology, Educational Technology, Organizations (Groups)
Dunn, Deborah – Association of Small Computer Users in Education (ASCUE), 2005
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
Descriptors: Databases, Information Technology, Computer Security, Computer Literacy
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection