NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 102 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Peer reviewed Peer reviewed
Direct linkDirect link
Parekh, Geet; DeLatte, David; Herman, Geoffrey L.; Oliva, Linda; Phatak, Dhananjay; Scheponik, Travis; Sherman, Alan T. – IEEE Transactions on Education, 2018
This paper presents and analyzes results of two Delphi processes that polled cybersecurity experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These ratings can be used to identify core concepts--cross-cutting ideas that connect knowledge in the discipline. The first Delphi process identified core concepts that…
Descriptors: Delphi Technique, Specialists, Fundamental Concepts, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Jethwani, Monique M.; Memon, Nasir; Seo, Won; Richer, Ariel – Journal of Educational Computing Research, 2017
Utilizing qualitative data gleaned from focus groups with adolescent girls participating in a cybersecurity summer program (N = 38, mean age = 16.3), this study examines the following research questions: (a) How do adolescent girls perceive the cybersecurity field?; and (b) What are the promising practices that engage girls in cybersecurity…
Descriptors: Adolescents, Females, Computer Security, Focus Groups
Peer reviewed Peer reviewed
Direct linkDirect link
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Moskal, Edward J. – Information Systems Education Journal, 2015
In order to effectively ensure our continued technical advantage and future cybersecurity, we need a technologically skilled and cyber savvy workforce and an effective pipeline of future employees. Our Government has identified Cybersecurity as one of the most serious economic and national security challenges we face as a nation and has ear-marked…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nakama, Debra; Paullet, Karen – Information Systems Education Journal, 2018
There is urgency for minority serving rural hybrid community colleges for innovation in offering cybersecurity education to local high school students who have no access to these emerging occupations. Focusing on high school women and minorities, this case study uses field experiences to drive an iterative improvement process that enhances the…
Descriptors: Information Systems, Rural Areas, Information Security, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Business-Higher Education Forum, 2017
"Invest to Improve: The Cybersecurity Talent Deficit" provides recommendations for cybersecurity stakeholders--employers, government agencies, and higher education institutions--to enable regional partnerships to meet today's cybersecurity skills needs. This report combines data from a 2017 Gallup survey of business executives and higher…
Descriptors: Information Security, Talent, Information Systems, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Inan, Fethi A.; Namin, Akbar S.; Pogrund, Rona L.; Jones, Keith S. – Educational Technology & Society, 2016
Twenty individuals with visual impairments were surveyed in order to (a) understand their Internet use and (b) examine relations between metrics related to Internet use and cybersecurity-related knowledge, skills, confidence, and attitudes. Participants used the Internet for various purposes, including information search, communication, chatting,…
Descriptors: Internet, Computer Use, Computer Security, Visual Impairments
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C.; Wen, Bo – Journal of Education for Business, 2017
With the increasing demand for cybersecurity professionals, the authors examined how business schools are meeting that demand, specifically the core requirements of their cybersecurity curricula related to information systems programs. They examined 518 Association to Advance Collegiate Schools of Business-accredited business schools in the United…
Descriptors: Business Schools, Computer Security, College Curriculum, Undergraduate Study
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Gomillion, David – Information Systems Education Journal, 2018
Demand for graduates with cybersecurity skills continues to increase. Many universities have developed or are in the process of developing new courses or degree programs to meet student demand and fill the skill gap in industry. Instructors face unique challenges when developing cybersecurity courses: While it is widely recognized that hands-on…
Descriptors: Computer Security, Curriculum Development, Computer Science Education, Experiential Learning
Chong, Rylan C. – ProQuest LLC, 2018
The purpose of this study was to investigate the relationships of social cognitive career theory factors of past performance, verbal persuasion, vicarious experience, outcome expectancy, interest, and former students' cybersecurity research self-efficacy; and examine whether the relationships were different among gender, academic classification,…
Descriptors: Social Cognition, Computer Security, Self Efficacy, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Pawlowski, Suzanne D.; Jung, Yoonhyuk – Journal of Information Systems Education, 2015
Cybersecurity has become an essential topic in introductory information systems (IS) core courses. As an aid to course design, the exploratory research in this paper uses a social representations lens to elucidate the perceptions of cybersecurity and cybersecurity threats held by students. Analysis of qualitative survey data from 152 students at a…
Descriptors: Information Security, Information Science Education, Information Systems, Qualitative Research
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7