NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Policymakers1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 32 results Save | Export
Valdes, Edgar – ProQuest LLC, 2022
The aim of this study is to understand the Tor browser and its multiple applications as related to cybersecurity. The study also argues that most internet users are not aware of the danger they face when navigating the dark web. This research explores top executives' and specialized employees' awareness and understating of the hidden areas of…
Descriptors: Foreign Countries, Computer Security, Internet, Crime
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Haywood, M. Elizabeth – Journal of Information Systems Education, 2021
ISACA, a non-profit, independent association that advocates for professionals involved in information security, assurance, risk management, and governance, recently updated its IT governance framework, Control Objectives for Information and Related Technology (COBIT). COBIT 2019 presents a logical approach to information technology and policy…
Descriptors: Community Colleges, Crime, Computer Security, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Chapman, John – Higher Education Policy Institute, 2019
Higher education regularly experiences cyber attacks. Organisations that do not adequately protect themselves risk the loss or exposure of personal student and staff data and also commercial, institutional and research data that are valuable to cyber criminals operating domestically and internationally. This paper discusses: (1) the current…
Descriptors: Higher Education, Internet, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Almuhaideb, Abdullah M.; Saeed, Saqib – Journal of Information Systems Education, 2021
ABET accreditation has become a well-known standard for academic programs not only in the U.S. but also across the globe. Instantiating the processes to systematically improve the quality of programs is a daunting task for higher education institutions. In this contribution, we provide a detailed process-based framework that can assist aspiring…
Descriptors: Engineering Education, Accreditation (Institutions), Computer Security, Crime
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Fisher, Bonnie S., Ed.; Sloan, John J., III, Ed. – Charles C. Thomas, Publisher, Ltd, 2022
This new edition of "Campus Crime" shares with readers the advancements that have been made in understanding campus crime. Across the three sections of the book, chapters review changes while also addressing current -- and even future -- crime and security issues confronting institutions of higher education. Some of these chapters…
Descriptors: Crime, Higher Education, Victims of Crime, Sexual Abuse
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…
Descriptors: Computer Security, Crime, Victims, Higher Education
Previous Page | Next Page ยป
Pages: 1  |  2  |  3