NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jeff Hanson; Blair Taylor; Siddharth Kaza – Information Systems Education Journal, 2025
Cybersecurity content is typically taught and assessed using Bloom's Taxonomy to ensure that students acquire foundational and higher-order knowledge. In this study we show that when students are given the objectives written in the form of a competency-based statements, students have a more clearly defined outcome and are be able to exhibit their…
Descriptors: College Students, Universities, Competency Based Education, Educational Objectives
Peer reviewed Peer reviewed
Direct linkDirect link
Topuz, Arif Cem; Saka, Eda; Fatsa, Ömer Faruk; Kursun, Engin – Smart Learning Environments, 2022
The COVID-19 pandemic caused many educational institutions in the world to switch to the distance education process, and this process was called "Emergency Remote Teaching". This urgent transition process has caused many problems in educational environments. One of the problems is the subject of measurement and evaluation. Along with the…
Descriptors: COVID-19, Pandemics, Distance Education, Student Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Paiva, José Carlos; Leal, José Paulo; Figueira, Álvaro – ACM Transactions on Computing Education, 2022
Practical programming competencies are critical to the success in computer science (CS) education and go-to-market of fresh graduates. Acquiring the required level of skills is a long journey of discovery, trial and error, and optimization seeking through a broad range of programming activities that learners must perform themselves. It is not…
Descriptors: Automation, Computer Assisted Testing, Student Evaluation, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Poulsen, Seth; Herman, Geoffrey L.; Peterson, Peter A. H.; Golaszewski, Enis; Gorti, Akshita; Oliva, Linda; Scheponik, Travis; Sherman, Alan T. – ACM Transactions on Computing Education, 2022
We present a psychometric evaluation of a revised version of the "Cybersecurity Concept Inventory" ("CCI"), completed by 354 students from 29 colleges and universities. The CCI is a conceptual test of understanding created to enable research on instruction quality in cybersecurity education. This work extends previous expert…
Descriptors: Psychometrics, Computer Security, Measures (Individuals), Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods