Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 4 |
| Introductory Courses | 4 |
| Teaching Methods | 4 |
| Undergraduate Students | 4 |
| Computer Science Education | 3 |
| Computer Software | 3 |
| Behavior Change | 2 |
| Computer Literacy | 2 |
| Computer Networks | 2 |
| Computer Science | 2 |
| Distance Education | 2 |
| More ▼ | |
Source
| ACM Transactions on Computing… | 1 |
| International Association for… | 1 |
| Journal of Information… | 1 |
| Journal on Educational… | 1 |
Publication Type
| Journal Articles | 3 |
| Collected Works - Proceedings | 1 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 3 |
| Elementary Secondary Education | 1 |
Audience
Location
| Asia | 1 |
| Australia | 1 |
| Brazil | 1 |
| Colorado (Colorado Springs) | 1 |
| Connecticut | 1 |
| Denmark | 1 |
| Egypt | 1 |
| Estonia | 1 |
| Florida | 1 |
| Germany | 1 |
| Greece | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Taylor, Blair; Kaza, Siddharth – ACM Transactions on Computing Education, 2016
Despite the critical societal importance of computer security, security is not well integrated into the undergraduate computing curriculum. Security classes and tracks treat security issues as separable topics as opposed to fundamental issues that pervade all aspects of software development. Recently, there has been an increasing focus on security…
Descriptors: Coding, Introductory Courses, Computer Science Education, Programming
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers

Peer reviewed
Direct link
