IT security in secondary CS education

Author:

Riel Manuel1,Romeike Ralf1

Affiliation:

1. Freie Universität Berlin, Berlin, Germany

Publisher

ACM

Reference6 articles.

1. Tim Bell Paul Tymann and Amiram Yehudai. 2011. The Big Ideas of K-12 Computer Science Education. Tim Bell Paul Tymann and Amiram Yehudai. 2011. The Big Ideas of K-12 Computer Science Education.

2. A comparison of the field data management and its representation in secondary CS curricula

3. Joseph Hallett Robert Larson and Awais Rashid. 2018. Mirror mirror on the wall: What are we teaching them all? Characterising the focus of cybersecurity curricular frameworks. In 2018 {USENIX} Workshop on Advances in Security Education ({ASE} 18). Joseph Hallett Robert Larson and Awais Rashid. 2018. Mirror mirror on the wall: What are we teaching them all? Characterising the focus of cybersecurity curricular frameworks. In 2018 { USENIX } Workshop on Advances in Security Education ( { ASE } 18) .

4. Philipp Mayring. 2004. Qualitative content analysis. A companion to qualitative research 1 2004 (2004) 159--176. Philipp Mayring. 2004. Qualitative content analysis. A companion to qualitative research 1 2004 (2004) 159--176.

5. Bringing Cyber to School: Integrating Cybersecurity Into Secondary School Education

Cited by 5 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Equitable Access to Cybersecurity Education: A Case Study of Underserved Middle School Students;Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1;2024-07-03

2. Behind the Screens: The Security & Privacy Advice Landscape of Children in Grades 5 & 6;Proceedings of the 18th WiPSCE Conference on Primary and Secondary Computing Education Research;2023-09-27

3. Cyber Security in English Secondary Education Curricula;Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1;2023-03-02

4. Measuring cyber secure behavior of elementary and high school students in the Netherlands;Computers & Education;2022-09

5. The who, how and why of choosing post-16 computing curricula: a case study of English further education colleges;Journal of Further and Higher Education;2022-06-27

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3