NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 376 to 390 of 1,589 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Arnon Hershkovitz; Orly Lahav – International Journal of Teaching and Learning in Higher Education, 2023
This article presents a study of a full-day, university-organized, online hackathon that aimed at designing solutions to problems raised in remote learning and teaching. The event, with about 80 participants, was carried out during the COVID-19 pandemic when many schools were closed and shifted to emergency remote teaching. The hackathon…
Descriptors: Electronic Learning, Computer Security, Information Security, COVID-19
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
He, Jonathan; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails,…
Descriptors: Information Security, Computer Security, Computer Software, Summer Programs
Victor Ramon Arenas – ProQuest LLC, 2021
Cybersecurity faculty do not have the time to respond to the rapid and pervasive cybersecurity academic landscape. For faculty to respond to this challenge, they are expected to continuously adapt to remain competitive. The purpose of this descriptive phenomenological study was to explore the cybersecurity faculty's perceptions of their need to…
Descriptors: Course Content, Computer Security, Professional Education, Industry
Peer reviewed Peer reviewed
Direct linkDirect link
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
Valcourt, Scott A. – ProQuest LLC, 2017
The Science DMZ is a network research tool offering superior large science data transmission between two locations. Through a network design that places the Science DMZ at the edge of the campus network, the Science DMZ defines a network path that avoids packet inspecting devices (firewalls, packet shapers) and produces near line-rate transmission…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data Processing
Peer reviewed Peer reviewed
Direct linkDirect link
Payne, Brian K.; Paredes, Tisha; Cross, Bria – Education, 2020
This qualitative study assesses students' perceptions about electronic portfolios. A survey including two open-ended questions focusing on what students learned and what they would recommend to others about electronic portfolios was administered to current enrolled students majoring in criminal justice, cybersecurity, or leadership. We analyzed…
Descriptors: Student Attitudes, Portfolios (Background Materials), Electronic Publishing, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Burrell, Darrell Norman; Courtney-Dattola, Ashley; Burton, Sharon L.; Nobles, Calvin; Springs, Delores; Dawson, Maurice E. – International Journal of Information and Communication Technology Education, 2020
Many universities require end of course evaluations for all courses taught as tool for academic accreditation purposes. The reality is that often many academic departments either do not do anything or have no idea what to do when evaluations continue to be poor. As a result, students have fought back against this process to create their own…
Descriptors: Internet, Instructional Improvement, Information Technology, Computer Security
Emerick, Gerald John – ProQuest LLC, 2020
Despite the strong, global demand for talented workers, higher than average salaries, and relatively low education requirements (bachelor's degree) for computing fields such as cybersecurity, there continues to be a pipeline issue with graduating enough workers educated in cybersecurity to fill the demand in the United States and globally…
Descriptors: Computer Security, Information Security, Career Choice, Influences
Peer reviewed Peer reviewed
Direct linkDirect link
Wang, Shouhong; Wang, Hai – International Journal of Information and Communication Technology Education, 2019
This article investigates the opportunities and challenges of cybersecurity for information systems (IS) programs and proposes a curriculum structure of cybersecurity track for IS programs. The study has collected data from eighty-two course websites of thirteen institutions at the graduate level and sixteen institutions at the undergraduate level…
Descriptors: Opportunities, Internet, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Draus, Peter; Mishra, Sushma; Slonka, Kevin; Bromall, Natalya – Information Systems Education Journal, 2022
Information Technology (IT) skills gap discourse suggests a mismatch between what students are acquiring in terms of knowledge and skills in their education versus what employers believe are useful skills for doing day to day tasks. This study builds upon previous research (analyzing the skills of college students in IT-related majors) by…
Descriptors: Skills, Achievement Gap, Employment Qualifications, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Florence; Gezer, Tuba; Wang, Wei Chao; Petty, Teresa; Wang, Chuang – Journal of Research on Technology in Education, 2022
Digital citizenship refers to exhibiting responsible digital habits to function in a digital world. The purpose of this mixed methods study is to examine K-12 educators' experiences based on a digital citizenship graduate-level course that they participated in for professional development. Forty-five educators participated in this course. In…
Descriptors: Elementary Secondary Education, Teaching Experience, Graduate Study, Faculty Development
Aljuaid, Alanoud – ProQuest LLC, 2022
There is a workforce shortage and a huge gender disparity in the cybersecurity profession globally and Saudi Arabia. Enabling women to access these opportunities involves bolstering training and implementing reforms to give women the go-ahead to access these opportunities. With only a paltry 5% of women being in cybersecurity in the Middle East…
Descriptors: Foreign Countries, Gender Differences, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Peer reviewed Peer reviewed
Direct linkDirect link
Kong, Siu-Cheung; Ma, Yunsi Tina – International Journal of Distance Education Technologies, 2022
The current study aims to analyse school leaders' understanding and expectation of, and support for, online teaching and learning during and after the outbreak of the COVID-19 pandemic. Based on the theory of reasoned action (TRA) framework, the authors designed a questionnaire and collected 319 responses from school principals about their views…
Descriptors: Administrator Attitudes, Principals, Online Courses, COVID-19
Pages: 1  |  ...  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  30  |  ...  |  106