Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 5 |
Descriptor
Computer Security | 5 |
Terrorism | 5 |
Crime Prevention | 3 |
Facilities | 2 |
Federal Government | 2 |
Information Security | 2 |
National Security | 2 |
Nuclear Energy | 2 |
Public Agencies | 2 |
Social Theories | 2 |
Taxonomy | 2 |
More ▼ |
Source
Journal of Cybersecurity… | 2 |
Academic Questions | 1 |
Journal of Learning and… | 1 |
US Government Accountability… | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Information Analyses | 1 |
Legal/Legislative/Regulatory… | 1 |
Opinion Papers | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Policymakers | 1 |
Location
Iran | 1 |
Ukraine | 1 |
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kuru, Hüseyin – Journal of Learning and Teaching in Digital Age, 2023
After the Cold War period, with the restructuring of the world, globalization, the revolution in information technology and the reconstruction of capitalism have created a new type of society, the "network society". The dependence of countries on information technologies, especially the internet, has increased day by day, and it has…
Descriptors: Terrorism, Information Technology, Facilities, Nuclear Energy
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Ida L. Oesteraas – Journal of Cybersecurity Education, Research and Practice, 2023
The National Security Agency (NSA) awards Center of Academic Excellence (CAE) designations to institutions that commit to producing cybersecurity professionals who will work in careers that reduce vulnerabilities in our national infrastructure. A review of the curricula in the 327 institutions and their degree programs reveal that only two…
Descriptors: National Security, Federal Government, Public Agencies, Computer Security
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses