Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Networks | 2 |
| Computer Science Education | 2 |
| Computer Security | 2 |
| Ethics | 2 |
| Case Studies | 1 |
| Certification | 1 |
| College Students | 1 |
| Confidentiality | 1 |
| Crime Prevention | 1 |
| Curriculum Development | 1 |
| Experiential Learning | 1 |
| More ▼ | |
Source
| Journal of Information… | 2 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Location
| Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality

Peer reviewed
Direct link
