Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Automation | 4 |
| Computer Security | 4 |
| Information Security | 4 |
| Computer System Design | 2 |
| Information Management | 2 |
| Access to Information | 1 |
| Active Learning | 1 |
| Archives | 1 |
| Change Strategies | 1 |
| College Students | 1 |
| Computer Simulation | 1 |
| More ▼ | |
Source
| American School & University | 1 |
| Education and Information… | 1 |
| Information Systems Education… | 1 |
| School Business Affairs | 1 |
Author
| Alawneh, John | 1 |
| Jan Vykopal | 1 |
| Ján Dovjak | 1 |
| Marquardson, Jim | 1 |
| Pavel Celeda | 1 |
| Pearring, John | 1 |
| Valdemar Švábenský | 1 |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 3 |
| Reports - Research | 1 |
Education Level
| Elementary Secondary Education | 2 |
| Higher Education | 2 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Marquardson, Jim – Information Systems Education Journal, 2018
Academics are responding to the call from industry for graduates armed with cybersecurity skills. A common challenge that educators face is creating effective cybersecurity curriculum that prepares students with practical skills upon graduation. While hands-on exercises are a powerful method for teaching and assessing cybersecurity skills, these…
Descriptors: Information Security, Information Science Education, Teaching Methods, Skill Development
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security

Peer reviewed
Direct link
