NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 51 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Parekh, Geet; DeLatte, David; Herman, Geoffrey L.; Oliva, Linda; Phatak, Dhananjay; Scheponik, Travis; Sherman, Alan T. – IEEE Transactions on Education, 2018
This paper presents and analyzes results of two Delphi processes that polled cybersecurity experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These ratings can be used to identify core concepts--cross-cutting ideas that connect knowledge in the discipline. The first Delphi process identified core concepts that…
Descriptors: Delphi Technique, Specialists, Fundamental Concepts, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Jethwani, Monique M.; Memon, Nasir; Seo, Won; Richer, Ariel – Journal of Educational Computing Research, 2017
Utilizing qualitative data gleaned from focus groups with adolescent girls participating in a cybersecurity summer program (N = 38, mean age = 16.3), this study examines the following research questions: (a) How do adolescent girls perceive the cybersecurity field?; and (b) What are the promising practices that engage girls in cybersecurity…
Descriptors: Adolescents, Females, Computer Security, Focus Groups
Peer reviewed Peer reviewed
Direct linkDirect link
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bicak, Ali; Liu, Michelle; Murphy, Diane – Information Systems Education Journal, 2015
The cybersecurity curriculum has grown dramatically over the past decade: once it was just a couple of courses in a computer science graduate program. Today cybersecurity is introduced at the high school level, incorporated into undergraduate computer science and information systems programs, and has resulted in a variety of cybersecurity-specific…
Descriptors: Information Security, Curriculum Design, Computer Science, Graduate Study
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Moskal, Edward J. – Information Systems Education Journal, 2015
In order to effectively ensure our continued technical advantage and future cybersecurity, we need a technologically skilled and cyber savvy workforce and an effective pipeline of future employees. Our Government has identified Cybersecurity as one of the most serious economic and national security challenges we face as a nation and has ear-marked…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Peer reviewed Peer reviewed
Direct linkDirect link
Inan, Fethi A.; Namin, Akbar S.; Pogrund, Rona L.; Jones, Keith S. – Educational Technology & Society, 2016
Twenty individuals with visual impairments were surveyed in order to (a) understand their Internet use and (b) examine relations between metrics related to Internet use and cybersecurity-related knowledge, skills, confidence, and attitudes. Participants used the Internet for various purposes, including information search, communication, chatting,…
Descriptors: Internet, Computer Use, Computer Security, Visual Impairments
Peer reviewed Peer reviewed
Direct linkDirect link
Yang, Samuel C.; Wen, Bo – Journal of Education for Business, 2017
With the increasing demand for cybersecurity professionals, the authors examined how business schools are meeting that demand, specifically the core requirements of their cybersecurity curricula related to information systems programs. They examined 518 Association to Advance Collegiate Schools of Business-accredited business schools in the United…
Descriptors: Business Schools, Computer Security, College Curriculum, Undergraduate Study
Peer reviewed Peer reviewed
Direct linkDirect link
Pawlowski, Suzanne D.; Jung, Yoonhyuk – Journal of Information Systems Education, 2015
Cybersecurity has become an essential topic in introductory information systems (IS) core courses. As an aid to course design, the exploratory research in this paper uses a social representations lens to elucidate the perceptions of cybersecurity and cybersecurity threats held by students. Analysis of qualitative survey data from 152 students at a…
Descriptors: Information Security, Information Science Education, Information Systems, Qualitative Research
Peer reviewed Peer reviewed
Direct linkDirect link
Berson, Michael J.; Berson, Ilene R. – Social Education, 2014
Educators have been increasingly sensitized to the role of schools in developing students' cyberethics, cybercitizenship, and cybersafety, which have emerged as one of the most pressing and yet unexplored areas of education. The Department of Defense has identified challenges to cybersecurity infrastructure as a significant risk for the…
Descriptors: Bullying, Computer Mediated Communication, School Role, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Mark A.; Patten, Karen P. – Journal of Information Systems Education, 2015
Recent high profile hackings have cost companies millions of dollars resulting in an increasing priority to protect government and business data. Universities are under increased pressure to produce graduates with better security knowledge and skills, particularly emerging cybersecurity skills. Although accredited undergraduate computing programs…
Descriptors: Taxonomy, Computer Security, Curriculum Development, Undergraduate Study
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pittman, Jason M.; Pike, Ronald E. – Information Systems Education Journal, 2016
This paper reports on the design and implementation of a cybersecurity camp offered as a cybersecurity learning experience to a group of female and male high school students. Students ranged in grade level from freshmen to senior. Student demographics, including any existing pre-requisite knowledge, were unknown to camp designers prior to the…
Descriptors: Peer Relationship, Cooperative Learning, High School Students, Observation
Peer reviewed Peer reviewed
Direct linkDirect link
Calhoun, Cheryl D. – Community College Journal of Research and Practice, 2017
The main goal of this project is to expand cybersecurity curriculum. This was accomplished by developing six new courses. The curriculum for each course utilized a common online course for all class formats including web-enhanced, hybrid, or online. In this article, we will discuss the online components used, faculty professional development, and…
Descriptors: Blended Learning, Information Security, Community Colleges, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Salah, Khaled; Hammoud, Mohammad; Zeadally, Sherali – IEEE Transactions on Learning Technologies, 2015
Cloud computing platforms can be highly attractive to conduct course assignments and empower students with valuable and indispensable hands-on experience. In particular, the cloud can offer teaching staff and students (whether local or remote) on-demand, elastic, dedicated, isolated, (virtually) unlimited, and easily configurable virtual machines.…
Descriptors: Computer Security, Information Storage, Computer Science Education, Undergraduate Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Martin, Nancy; Woodward, Belle – Information Systems Education Journal, 2013
Now more than ever, cybersecurity professionals are in demand and the trend is not expected to change anytime soon. Currently, only a small number of educational programs are funded and equipped to educate cybersecurity professionals and those few programs cannot train a workforce of thousands in a relatively short period of time. Moreover, not…
Descriptors: Computer Security, Labor Force Development, Hands on Science, Experiential Learning
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4