Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Knowledge Level | 3 |
| Computer Science | 2 |
| Bachelors Degrees | 1 |
| Business Schools | 1 |
| Certification | 1 |
| College Students | 1 |
| Competence | 1 |
| Computer Networks | 1 |
| Computer Science Education | 1 |
| Computer Security | 1 |
| Computer Software | 1 |
| More ▼ | |
Source
| Information Systems Education… | 3 |
Author
| Babb, Jeffry S. | 2 |
| Waguespack, Leslie J. | 2 |
| Battig, Michael | 1 |
| Chen, Frankie | 1 |
| Frydenberg, Mark | 1 |
| McDermott, Isabelle | 1 |
| OConnell, Jake | 1 |
| Shariq, Muhammad | 1 |
| Yates, David J. | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Reports - Evaluative | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| Afghanistan | 1 |
| Massachusetts | 1 |
| Texas | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Waguespack, Leslie J.; Babb, Jeffry S. – Information Systems Education Journal, 2019
Amidst academic societies and agencies that accredit computing education there is a growing enthusiasm to reexamine the efficacy of the traditional model of curricular description that focused on areas of knowledge. The knowledge model informed the architecture and design of programs of teaching and learning in post-secondary, degree-granting…
Descriptors: Competence, Computer Science Education, Curriculum, Labor Force Development
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Battig, Michael; Shariq, Muhammad – Information Systems Education Journal, 2011
Using a previously published study of how students differentiate between computing disciplines, this study attempts to validate the original research and add additional hypotheses regarding the type of institution that the student resides. Using the identical survey instrument from the original study, students in smaller colleges and in different…
Descriptors: Computer Science, Intellectual Disciplines, College Students, Validity

Peer reviewed
