Publication Date
In 2025 | 1 |
Since 2024 | 6 |
Descriptor
Computer Security | 6 |
Information Storage | 6 |
Information Security | 4 |
Information Technology | 4 |
Computer Networks | 2 |
Computer Oriented Programs | 2 |
Confidentiality | 2 |
Databases | 2 |
Prevention | 2 |
Privacy | 2 |
Access to Computers | 1 |
More ▼ |
Author
Bingbing Di | 1 |
Brady D. Lund | 1 |
Eric G. Pardiñan | 1 |
Gang Zhao | 1 |
Hui He | 1 |
Jivulter C. Mangubat | 1 |
Lidong Wang | 1 |
Michael Christopher Waranowicz | 1 |
Qingqing Guo | 1 |
Ricson M. Bondad | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 4 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Administrators | 1 |
Support Staff | 1 |
Teachers | 1 |
Location
New Jersey | 1 |
Philippines | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brady D. Lund – Journal of Cybersecurity Education, Research and Practice, 2024
This paper investigates the integration of blockchain technology into core systems within institutions of higher education, utilizing the National Institute of Standards and Technology's (NIST) Cybersecurity Framework as a guiding framework. It supplies definitions of key terminology including blockchain, consensus mechanisms, decentralized…
Descriptors: Computer Oriented Programs, Computer Security, Databases, Information Storage
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Lidong Wang – Journal of Cybersecurity Education, Research and Practice, 2024
Additive manufacturing (AM) has been applied to automotive, aerospace, medical sectors, etc., but there are still challenges such as parts' porosity, cracks, surface roughness, intrinsic anisotropy, and residual stress because of the high level of thermal gradient. It is significant to conduct the modeling and simulation of the AM process and…
Descriptors: Computer Security, Computer Science, Artificial Intelligence, Computer Simulation
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights