NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)5
Since 2016 (last 10 years)5
Since 2006 (last 20 years)12
Audience
Policymakers1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 12 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kuru, Hüseyin – Journal of Learning and Teaching in Digital Age, 2023
After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has…
Descriptors: Terrorism, Information Technology, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Aburto, Rafael – ProQuest LLC, 2014
This qualitative study examined efforts by the military organizations and federal agencies to improve information sharing, interoperability, and systems integration in all business practices. More specifically, a survey instrument with six open-ended and eight demographic questions was used to measure the perceived progress, issues, challenges of…
Descriptors: Qualitative Research, Shared Resources and Services, Access to Information, Agency Cooperation
Peer reviewed Peer reviewed
Direct linkDirect link
Huddy, Leonie; Feldman, Stanley – American Psychologist, 2011
The 9/11 terrorist attacks have had profound effect on U.S. domestic and foreign security policy, leading to several expensive wars and the erosion of civil liberties (under the USA PATRIOT Act). We review evidence on political reactions to the 9/11 attacks and conclude that subjective reactions to terrorism played an important role in shaping…
Descriptors: Terrorism, National Security, Computer Security, Foreign Policy
Conley-Ware, Lakita D. – ProQuest LLC, 2010
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Descriptors: Crime, Terrorism, Identification, Computer Security
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
US Department of Homeland Security, 2009
The overarching goal of the National Infrastructure Protection Plan (NIPP) is to build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation's critical infrastructure and key resources (CIKR)…
Descriptors: National Security, Resources, Terrorism, Natural Disasters
Peer reviewed Peer reviewed
Direct linkDirect link
Cole, David R. – E-Learning, 2007
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process…
Descriptors: Electronic Learning, Terrorism, Internet, Educational Technology