NotesFAQContact Us
Collection
Advanced
Search Tips
Education Level
Postsecondary Education27
Higher Education25
Two Year Colleges4
Adult Education1
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 27 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Moskal, Edward J. – Information Systems Education Journal, 2015
In order to effectively ensure our continued technical advantage and future cybersecurity, we need a technologically skilled and cyber savvy workforce and an effective pipeline of future employees. Our Government has identified Cybersecurity as one of the most serious economic and national security challenges we face as a nation and has ear-marked…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C.; Wen, Bo – Journal of Education for Business, 2017
With the increasing demand for cybersecurity professionals, the authors examined how business schools are meeting that demand, specifically the core requirements of their cybersecurity curricula related to information systems programs. They examined 518 Association to Advance Collegiate Schools of Business-accredited business schools in the United…
Descriptors: Business Schools, Computer Security, College Curriculum, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Pawlowski, Suzanne D.; Jung, Yoonhyuk – Journal of Information Systems Education, 2015
Cybersecurity has become an essential topic in introductory information systems (IS) core courses. As an aid to course design, the exploratory research in this paper uses a social representations lens to elucidate the perceptions of cybersecurity and cybersecurity threats held by students. Analysis of qualitative survey data from 152 students at a…
Descriptors: Information Security, Information Science Education, Information Systems, Qualitative Research
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Mark A.; Patten, Karen P. – Journal of Information Systems Education, 2015
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Descriptors: Taxonomy, Computer Security, Curriculum Development, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Calhoun, Cheryl D. – Community College Journal of Research and Practice, 2017
The main goal of this project is to expand cybersecurity curriculum. This was accomplished by developing six new courses. The curriculum for each course utilized a common online course for all class formats including web-enhanced, hybrid, or online. In this article, we will discuss the online components used, faculty professional development, and…
Descriptors: Blended Learning, Information Security, Community Colleges, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Business-Higher Education Forum, 2014
The Business-Higher Education Forum (BHEF) has achieved particular success in operationalizing the National Higher Education and Workforce Initiative (HEWI) in Maryland around cybersecurity. Leveraging its membership of corporate CEOs, university presidents, and government agency leaders, BHEF partnered with the University System of Maryland to…
Descriptors: Internet, Computer Security, Corporations, College Presidents
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Salomon-Fernandez, Yves – New England Journal of Higher Education, 2014
Within the information technology sector, cybersecurity is considered its own supersector. As information becomes increasingly digitized and a growing array of transactions can be completed in the cloud, people, governments and enterprises become increasingly more vulnerable. The Identity Theft Resources Center (ITRC) reports nearly 5,000 breaches…
Descriptors: Information Technology, Information Security, Community Colleges, Universities
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Shuangbao; Kelly, William – Journal of Learning Analytics, 2017
In this paper, we present a novel system, inVideo, for video data analytics, and its use in transforming linear videos into interactive learning objects. InVideo is able to analyze video content automatically without the need for initial viewing by a human. Using a highly efficient video indexing engine we developed, the system is able to analyze…
Descriptors: Video Technology, Online Courses, Educational Technology, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Troyan, Danielle – Industry and Higher Education, 2015
BHEF has achieved particular success in operationalizing its National Higher Education and Workforce Initiative (HEWI) in Maryland focusing on cybersecurity. Leveraging its membership of corporate CEOs, university presidents and government agency leaders, BHEF partnered with the University System of Maryland to build a system-wide response to the…
Descriptors: Higher Education, Labor Force Development, Internet, Computer Security
Barkanic, Stephen – Business-Higher Education Forum, 2016
The United States faces a pressing national security and competitiveness challenge rooted in a shortage of a diverse, highly skilled workforce, particularly in vital cross-disciplinary fields such as data science and analytics, cybersecurity, and information technology. To address this challenge, Business-Higher Education Forum (BHEF) launched the…
Descriptors: Alignment (Education), Postsecondary Education, Labor Needs, Strategic Planning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony – Information Systems Education Journal, 2016
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
Descriptors: Competition, Undergraduate Students, Computer Security, Information Security
Previous Page | Next Page »
Pages: 1  |  2