Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Information Security | 4 |
Computer Networks | 2 |
Internet | 2 |
Privacy | 2 |
Advocacy | 1 |
Business Schools | 1 |
Certification | 1 |
Community Colleges | 1 |
Computer Science | 1 |
Course Descriptions | 1 |
More ▼ |
Source
Community College Journal | 1 |
Education Next | 1 |
Information Systems Education… | 1 |
State Educational Technology… | 1 |
Author
Babb, Jeffry S. | 1 |
Belastock, Eileen | 1 |
Chen, Frankie | 1 |
Frydenberg, Mark | 1 |
McDermott, Isabelle | 1 |
OConnell, Jake | 1 |
Pierce, Dennis | 1 |
Waguespack, Leslie J. | 1 |
Yates, David J. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Massachusetts | 4 |
Texas | 2 |
Connecticut | 1 |
Michigan | 1 |
Minnesota | 1 |
New York | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
State Educational Technology Directors Association, 2022
Many districts struggle to access the cybersecurity expertise or other resources needed to secure their networks and data appropriately. This isn't because mitigation strategies don't exist. Often, the barrage of suggestions and warnings directed at school IT leaders are too overwhelming to navigate, are not properly scoped for educational…
Descriptors: Computer Security, Information Security, Privacy, Elementary Secondary Education
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education