Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Case Studies | 2 |
| Computer Science Education | 2 |
| Program Effectiveness | 2 |
| Questionnaires | 2 |
| College Freshmen | 1 |
| College Students | 1 |
| Computer Networks | 1 |
| Computer Security | 1 |
| Confidentiality | 1 |
| Ethics | 1 |
| Experiential Learning | 1 |
| More ▼ | |
Source
| Journal of Information… | 2 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Location
| Australia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tuffley, David; Antonio, Amy – Journal of Information Technology Education: Innovations in Practice, 2013
First year students face a daunting range of challenges as they make the transition to university life. Their experiences in the first months of university have a defining influence on their success or otherwise in their studies. The purpose of this paper is to report on the results of a case study that tests the efficacy of a student engagement…
Descriptors: Foreign Countries, College Freshmen, Learner Engagement, School Holding Power
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality

Peer reviewed
Direct link
