Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 14 |
Descriptor
Computer Networks | 15 |
Undergraduate Students | 15 |
Computer Science Education | 11 |
Computer Science | 7 |
Computer Security | 7 |
Internet | 7 |
Student Attitudes | 7 |
Graduate Students | 6 |
Laboratories | 6 |
Computer Software | 5 |
Foreign Countries | 5 |
More ▼ |
Source
Author
Abdel-Maksoud, Nahed F. | 1 |
Babb, Jeffry S. | 1 |
Bhagyavati | 1 |
Bhunia, Swarup | 1 |
Bowman, Michael | 1 |
Cathy Horn | 1 |
Chen, Frankie | 1 |
Deniz Gurkan | 1 |
Frydenberg, Mark | 1 |
Ghinea, Gheorghita | 1 |
Hamblen, J. O. | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Research | 8 |
Reports - Descriptive | 4 |
Reports - Evaluative | 2 |
Collected Works - Proceedings | 1 |
Information Analyses | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 13 |
Postsecondary Education | 10 |
Elementary Secondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
Egypt | 2 |
Florida | 2 |
Kazakhstan | 2 |
Spain | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Estonia | 1 |
Georgia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Abdel-Maksoud, Nahed F. – International Journal of Education and Practice, 2018
Virtualization technology has been around for many years, and its use is increasingly becoming common in education, in general and in computing fields, in particular. This can be attributed partly to its potential to reduce costs, boost efficiency and overcome limited resources through its virtual applications such as servers, storage devices and…
Descriptors: Electronic Learning, Educational Environment, Educational Quality, Instructional Effectiveness
Zhamanov, Azamat; Yoo, Seong-Moo; Sakhiyeva, Zhulduz; Zhaparov, Meirambek – International Journal of Information and Communication Technology Education, 2018
Students nowadays are hard to be motivated to study lessons with traditional teaching methods. Computers, smartphones, tablets and other smart devices disturb students' attentions. Nevertheless, those smart devices can be used as auxiliary tools of modern teaching methods. In this article, the authors review two popular modern teaching methods:…
Descriptors: Program Implementation, Program Evaluation, Blended Learning, Internet
Kongcharoen, Chaknarin; Hwang, Wu-Yuin; Ghinea, Gheorghita – Educational Technology & Society, 2017
More studies are concentrating on using virtualization-based labs to facilitate computer or network learning concepts. Some benefits are lower hardware costs and greater flexibility in reconfiguring computer and network environments. However, few studies have investigated effective mechanisms for using virtualization fully for collaboration.…
Descriptors: Experimental Groups, Control Groups, Comparative Analysis, Academic Achievement
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Hamblen, J. O.; van Bekkum, G. M. E. – IEEE Transactions on Education, 2013
This paper describes a new approach for a course and laboratory designed to allow students to develop low-cost prototypes of robotic and other embedded devices that feature Internet connectivity, I/O, networking, a real-time operating system (RTOS), and object-oriented C/C++. The application programming interface (API) libraries provided permit…
Descriptors: Robotics, Engineering Education, Computer Science Education, Internet
Nihalani, Priya K.; Mayrath, Michael; Robinson, Daniel H. – Journal of Educational Psychology, 2011
We investigated the effects of feedback and collaboration on undergraduates' transfer performance when using a computer networking training simulation. In Experiment 1, 65 computer science "novices" worked through an instructional protocol individually (control), individually with feedback, or collaboratively with feedback. Unexpectedly,…
Descriptors: Expertise, Feedback (Response), Computer Simulation, Prior Learning
Rice, George; Bowman, Michael – Journal of Information Technology Education, 2007
Children in the back seat on a long trip are not the only ones asking the question "Are we there yet?" At Murray State University (MSU) and other universities starting new programs, the question becomes one of validation of the program. In the late 90s, MSU, a midsize university, was entrusted with the responsibility of developing a program of…
Descriptors: Information Systems, Computers, Information Technology, Computer Science
Walker, Ellen; Rodger, Susan – 1996
The PipeLINK program seeks to attract and retain women and girls in computer science careers. Aimed at girls and women from the high school through the Ph.D. levels, the program suggests activities to aid participants at each level, connect students with role models and mentors, and provides an introduction to a wide variety of computer science…
Descriptors: Career Choice, Computer Networks, Computer Science, Computer Science Education
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers