Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
Source
| ACM Transactions on Computing… | 3 |
Author
| Archer, Ricky | 1 |
| Cutts, Quintin | 1 |
| Kaie Maennel | 1 |
| Olaf Maennel | 1 |
| Qadah, Yaseen | 1 |
| Renaud, Karen | 1 |
| Vega, Percy | 1 |
| Xu, Jinsheng | 1 |
| Yu, Huiming | 1 |
| Yuan, Xiaohong | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Information Analyses | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Human Aspects of Cyber Security for Computing Higher Education: Current Status and Future Directions
Kaie Maennel; Olaf Maennel – ACM Transactions on Computing Education, 2025
The human aspects of cyber security are fundamental as these are interlinked with processes and technology in building resilience against an evolving and complex threat landscape. It is vital to teach future cyber security specialists sufficient knowledge about human aspects in order to strengthen the defences and defend against malicious actors.…
Descriptors: Computer Security, Computer Science Education, College Curriculum, Teaching Methods
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study

Peer reviewed
Direct link
