NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 406 to 420 of 1,592 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kirk, Sarah; Foreman, Daniel; Lee, Cody; Beasley, Shannon W. – Journal of Cybersecurity Education, Research and Practice, 2019
The goal of this research is to describe an active learning opportunity that was conducted as a community service offering through our Center for Cybersecurity Education and Applied Research (CCEAR). As a secondary goal, the participants sought to gain real world experience by applying techniques and concepts studied in security classes. A local…
Descriptors: Active Learning, Computer Security, Information Security, Access to Information
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brown, Randy – Information Systems Education Journal, 2019
Information Security has been a challenge since humans began keeping information. With the advent of computerized data and computer networks, that challenge has increased dramatically. Not only are more breaches occurring, but public knowledge about those breaches is now commonplace adding to virtual hysteria concerning data and information…
Descriptors: Computer Security, Information Security, Professional Personnel, Specialists
Peer reviewed Peer reviewed
Direct linkDirect link
Kam, Hwee-Joo; Katerattanakul, Pairin – Journal of Information Technology Education: Innovations in Practice, 2019
Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to…
Descriptors: Academic Achievement, Learner Engagement, Computer Security, Information Security
Office of Educational Technology, US Department of Education, 2023
This is the second in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Technology Uses in Education, Educational Technology, Rural Education
Peer reviewed Peer reviewed
Direct linkDirect link
Roll, Michael J. J.; Ifenthaler, Dirk – Empirical Research in Vocational Education and Training, 2021
Developments of Industry 4.0 require a set of multidisciplinary digital competencies for future vocational teachers, consisting of specific knowledge, motivational aspects, cognitive abilities and skills to fulfill the demands of digitally interconnected work situations. The competence model that is adapted from future work scenarios of vocational…
Descriptors: Vocational Education Teachers, Teacher Competencies, Technological Literacy, Information Literacy
Peer reviewed Peer reviewed
Direct linkDirect link
Juliana E. Raffaghelli; Bonnie Stewart – OTESSA Conference Proceedings, 2021
In the higher education context, an increasing concern on the technical or instrumental approach permeates attention to academics' data literacies and faculty development. The need for data literacy to deal specifically with the rise of learning analytics in higher education has been raised by some authors, though in spite of some focus on the…
Descriptors: Statistics Education, Faculty Development, Higher Education, Learning Analytics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Green, Nathan; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2020
Finding the first full-time, major-related job is a challenge faced by most college students, particularly those who have not gained much working experience before entering the job market. This challenge is amplified for the students majoring in Information Technology (IT), and cybersecurity in particular, due to the constantly changing technology…
Descriptors: Information Technology, Resumes (Personal), College Graduates, Employment Potential
Marvin Schneider – ProQuest LLC, 2020
The purpose of this quantitative study was to explore the influence of protection motivation theory (PMT) constructs on security behaviors of undergraduate students. More specifically, the primary focus of this study is to answer our primary research question: to what extent do the independent variables (perceived threat severity, perceived threat…
Descriptors: Undergraduate Students, Self Efficacy, Student Attitudes, Telecommunications
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mary Beth Klinger – Journal of Cybersecurity Education, Research and Practice, 2024
This article explores the results of a project aimed at supporting community college students in their academic pursuit of an Associate of Applied Science (AAS) degree in Cybersecurity through mentorship, collaboration, skill preparation, and other activities and touch points to increase students' sense of belonging and connectedness in the…
Descriptors: Computer Security, Sense of Community, Associate Degrees, Community College Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Asfour, Ali; Zain, Samer; Salleh, Norsaremah; Grundy, John – International Journal of Technology in Education and Science, 2019
Agile development methods have been proposed as a natural fit for mobile app development contexts. Despite many studies addressing the adoption of agile methods for traditional web and desktop applications, there is a lack of studies of how mobile app development teams can adopt agile methods and the challenges they are facing. Our study explores…
Descriptors: Computer Software, Case Studies, Guidance, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gökçe, Kevser Gülnur; Dogerlioglu, Ozgur – Knowledge Management & E-Learning, 2019
Bring Your Own Device (BYOD) policy, which allows employees to use their own mobile devices for work and connection to their corporate network, is getting popular in enterprises. While companies want to improve the efficiency and productivity of employees, employees prefer to use their own devices at work, which make them feel more comfortable and…
Descriptors: Handheld Devices, Internet, Computer Security, Administrators
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Gomillion, David – Information Systems Education Journal, 2018
Demand for graduates with cybersecurity skills continues to increase. Many universities have developed or are in the process of developing new courses or degree programs to meet student demand and fill the skill gap in industry. Instructors face unique challenges when developing cybersecurity courses: While it is widely recognized that hands-on…
Descriptors: Computer Security, Curriculum Development, Computer Science Education, Experiential Learning
Pages: 1  |  ...  |  24  |  25  |  26  |  27  |  28  |  29  |  30  |  31  |  32  |  ...  |  107