Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Computers | 3 |
| Computer Science Education | 2 |
| Attitudes | 1 |
| Computer Networks | 1 |
| Computer Software | 1 |
| Course Content | 1 |
| Crime | 1 |
| Distance Education | 1 |
| Evidence | 1 |
| Expertise | 1 |
| More ▼ | |
Author
| Barrett, Diane | 1 |
| Lukowiak, Marcin | 1 |
| Radziszowski, Stanislaw | 1 |
| Sehla Ertan | 1 |
| T. Volkan Yüzer | 1 |
| Vallino, James | 1 |
| Wood, Christopher | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
| Tests/Questionnaires | 3 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sehla Ertan; T. Volkan Yüzer – Journal of Educational Technology and Online Learning, 2024
Open and distance learning (ODL) activities aim to meet the expectations and needs of different individuals, societies, and systems by ensuring the continuation of learning with a lifelong learning philosophy and an egalitarian policy for everyone, regardless of time and place. Support services, which address the differentiated expectations and…
Descriptors: Computer Security, Open Education, Distance Education, Technical Support
Barrett, Diane – Information Systems Education Journal, 2020
In a cloud computing environment, traditional digital forensic processes (such as turning off the computer to image the computer hard drive) can be disruptive to businesses because the data of businesses may be co-mingled with other content. As technology changes, the way digital forensics acquisitions are conducted are also changing. The change…
Descriptors: Computer Science Education, Crime, Evidence, Computer Security
Lukowiak, Marcin; Radziszowski, Stanislaw; Vallino, James; Wood, Christopher – ACM Transactions on Computing Education, 2014
With the continuous growth of cyberinfrastructure throughout modern society, the need for secure computing and communication is more important than ever before. As a result, there is also an increasing need for entry-level developers who are capable of designing and building practical solutions for systems with stringent security requirements.…
Descriptors: Computer Security, Computers, Computer Software, Computer Science Education

Peer reviewed
Direct link
