Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 12 |
Descriptor
Computer Security | 13 |
Information Technology | 6 |
Internet | 6 |
Higher Education | 5 |
Information Security | 4 |
Privacy | 4 |
Computer Networks | 3 |
Educational Technology | 3 |
Administrators | 2 |
Barriers | 2 |
Best Practices | 2 |
More ▼ |
Source
Author
Frydenberg, Mark | 2 |
Yates, David J. | 2 |
Anderson, Greg | 1 |
Babb, Jeffry S. | 1 |
Basken, Paul | 1 |
Belastock, Eileen | 1 |
Buck, Stephanie | 1 |
Chen, Frankie | 1 |
Clebsch, William | 1 |
Desmond Rudd | 1 |
Dougherty, Jennifer Dowling | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 11 |
Journal Articles | 10 |
Reports - Research | 2 |
Education Level
Higher Education | 8 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Two Year Colleges | 1 |
Audience
Policymakers | 1 |
Practitioners | 1 |
Location
Massachusetts | 13 |
Texas | 3 |
California | 2 |
Connecticut | 2 |
North Carolina | 2 |
Rhode Island | 2 |
Arizona | 1 |
District of Columbia | 1 |
Indiana | 1 |
Maine | 1 |
Maryland | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
Desmond Rudd; Zac Chase, Contributor; Michael Klein, Contributor – Office of Educational Technology, US Department of Education, 2025
This is the fourth in a series of five briefs published by Office of Education Technology (OET) on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations outlined in the 2017 OET…
Descriptors: Elementary Secondary Education, Educational Technology, Technology Uses in Education, Rural Areas
State Educational Technology Directors Association, 2022
Many districts struggle to access the cybersecurity expertise or other resources needed to secure their networks and data appropriately. This isn't because mitigation strategies don't exist. Often, the barrage of suggestions and warnings directed at school IT leaders are too overwhelming to navigate, are not properly scoped for educational…
Descriptors: Computer Security, Information Security, Privacy, Elementary Secondary Education
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Mentzer, Kevin; Frydenberg, Mark; Yates, David J. – Information Systems Education Journal, 2020
This paper presents student projects analyzing or using blockchain technologies, created by students enrolled in courses dedicated to teaching blockchain, at two different universities during the 2018- 2019 academic year. Students explored perceptions related to storing private healthcare information on a blockchain, managing the security of…
Descriptors: Active Learning, Student Projects, College Students, Computer Science Education
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
New England Board of Higher Education, 2018
Surveys of New England employers, college academic officers, and graduates find that many consider today's college graduates inadequately prepared for the world of work. In 2017, the New England Board of Higher Education convened the Commission on Higher Education & Employability, under the leadership of Rhode Island Governor Gina M. Raimondo.…
Descriptors: Education Work Relationship, Employment Potential, College Graduates, Career Readiness
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Hart, Kevin – CURRENTS, 2010
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Descriptors: Higher Education, Computer Security, Barriers, Confidentiality
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Campus Technology, 2007
This article profiles the winners of this year's competition for outstanding technology innovation on US college and university campuses. The winners are: (1) Rice University, Texas (virtualized networks); (2) Drexel University, Pennsylvania (rich media); (3) Harvard Business School, Massachusetts (network management); (4) Louisiana State…
Descriptors: Educational Innovation, Awards, Emergency Programs, Higher Education
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration