NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Tutorial Programs, Computer Science Education, Computer Security, Programming
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ho, Anne M. – PRIMUS, 2018
Escape rooms are an increasingly popular puzzle game, and educators have started implementing them in classrooms. This paper will describe the motivations and implementation of escape-room-like puzzles in an undergraduate cryptography course, including how the open-source mathematics software system SageMath is used. In addition, there is a…
Descriptors: Puzzles, Technology, Class Activities, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Desai, Niranjan; Stefanek, George – American Journal of Engineering Education, 2017
Student access to the Internet has made it much easier for students to find solutions to traditional homework problems online and thereby has made this traditional assessment method of monitoring student progress and gauging the assimilation of knowledge in engineering and technology courses less reliable. This paper presents an in-class,…
Descriptors: Academic Achievement, Homework, Technology, Tests
Peer reviewed Peer reviewed
Direct linkDirect link
Stanisavljevic, Zarko; Stanisavljevic, Jelena; Vuletic, Pavle; Jovanovic, Zoran – IEEE Transactions on Learning Technologies, 2014
Educational software systems have an increasingly significant presence in engineering sciences. They aim to improve students' attitudes and knowledge acquisition typically through visual representation and simulation of complex algorithms and mechanisms or hardware systems that are often not available to the educational institutions. This paper…
Descriptors: Technology, Mathematics, Visual Aids, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Aydin, Nuh – PRIMUS, 2009
The theory of error-correcting codes and cryptography are two relatively recent applications of mathematics to information and communication systems. The mathematical tools used in these fields generally come from algebra, elementary number theory, and combinatorics, including concepts from computational complexity. It is possible to introduce the…
Descriptors: Mathematics Curriculum, Computer Science, Number Concepts, Liberal Arts