Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 4 |
Descriptor
| Coding | 4 |
| Computer Security | 4 |
| Computer Science Education | 3 |
| Mathematics Education | 2 |
| Technology | 2 |
| College Mathematics | 1 |
| College Students | 1 |
| Competition | 1 |
| Credentials | 1 |
| Faculty Development | 1 |
| High School Teachers | 1 |
| More ▼ | |
Author
| Borowczak, Mike | 1 |
| Burrows, Andrea C. | 1 |
| Collins, Jazmin | 1 |
| David P. Bunde | 1 |
| Ford, Vitaly | 1 |
| John F. Dooley | 1 |
| Mugayitoglu, Bekir | 1 |
| Ulrich A. Hoensch | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 2 |
| Reports - Research | 2 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
| High Schools | 1 |
| Secondary Education | 1 |
Audience
| Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
David P. Bunde; John F. Dooley – PRIMUS, 2024
We present a detailed description of a Cryptography and Computer Security course that has been offered at Knox College for the last 15 years. While the course is roughly divided into two sections, Cryptology and Computer Security, our emphasis here is on the Cryptology section. The course puts the cryptologic material into its historical context…
Descriptors: Technology, Coding, Computer Security, Mathematics Education
Collins, Jazmin; Ford, Vitaly – Journal of Cybersecurity Education, Research and Practice, 2023
The use of the Capture the Flag (CTF)-style competitions has grown popular in a variety of environments as a method to improve or reinforce cybersecurity techniques. However, while these competitions have shown promise in student engagement, enjoyment, and the teaching of essential workforce cybersecurity concepts, many of these CTF challenges…
Descriptors: Computer Security, Computer Science Education, Coding, Competition
Burrows, Andrea C.; Borowczak, Mike; Mugayitoglu, Bekir – Education Sciences, 2022
Computer science, cybersecurity education, and microcredentials are becoming more pervasive in all levels of the educational system. The purpose of this study was partnering with precollegiate teachers: (1) to investigate the self-efficacy of 30 precollegiate teacher participants towards computer science before, during, and after three iterations…
Descriptors: Computer Science Education, Computer Security, Coding, Partnerships in Education

Peer reviewed
Direct link
