Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Information Security | 3 |
| Computer Science Education | 2 |
| Computer Software | 2 |
| Education Work Relationship | 2 |
| Barriers | 1 |
| Coding | 1 |
| Competence | 1 |
| Computer Mediated… | 1 |
| Concept Formation | 1 |
| Course Content | 1 |
| More ▼ | |
Source
| ACM Transactions on Computing… | 3 |
Author
| Abdel-Karim Al-Tamimi | 1 |
| Bendler, Daniel | 1 |
| Felderer, Michael | 1 |
| Kaza, Siddharth | 1 |
| Khalid Samara | 1 |
| Maher Salem | 1 |
| Taylor, Blair | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Information Analyses | 1 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Location
| Maryland | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bendler, Daniel; Felderer, Michael – ACM Transactions on Computing Education, 2023
Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the…
Descriptors: Models, Information Security, Computer Security, Competence
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming

Peer reviewed
Direct link
