Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Science Education | 3 |
| Computer Security | 3 |
| College Students | 2 |
| Computer Networks | 2 |
| Ethics | 2 |
| Information Security | 2 |
| Academic Achievement | 1 |
| Case Studies | 1 |
| Certification | 1 |
| Confidentiality | 1 |
| Crime Prevention | 1 |
| More ▼ | |
Source
| Journal of Information… | 3 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 2 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kam, Hwee-Joo; Katerattanakul, Pairin – Journal of Information Technology Education: Innovations in Practice, 2019
Aim/Purpose: In this study, the researchers investigated whether the out-of-class learning approach could help the students to attain any valuable learning outcomes for cybersecurity learning and could enhance the perceived value of cybersecurity education among the students. Background: Cybersecurity learning poses challenges for its students to…
Descriptors: Academic Achievement, Learner Engagement, Computer Security, Information Security
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality

Peer reviewed
Direct link
