Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Educational Technology | 2 |
| Information Science Education | 2 |
| Information Security | 2 |
| Barriers | 1 |
| College Faculty | 1 |
| Computer Networks | 1 |
| Computer Simulation | 1 |
| Database Design | 1 |
| Database Management Systems | 1 |
| Educational Practices | 1 |
| More ▼ | |
Author
| Baker, Elizabeth | 1 |
| Mayes, Lisa | 1 |
| Paredes, Tisha | 1 |
| Payne, Brian K. | 1 |
| Reinicke, Bryan | 1 |
| Smith, Elizabeth | 1 |
| Toothman, Callie | 1 |
| Wu, Hongyi | 1 |
| Xin, ChunSheng | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
Location
| Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Payne, Brian K.; Mayes, Lisa; Paredes, Tisha; Smith, Elizabeth; Wu, Hongyi; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university's undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and…
Descriptors: Interdisciplinary Approach, Information Security, Computer Security, Information Science Education
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops

Peer reviewed
