Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 13 |
Descriptor
Computer Security | 13 |
Information Security | 11 |
Internet | 6 |
Knowledge Level | 5 |
Computer Networks | 3 |
Law Enforcement | 3 |
Training | 3 |
Access to Computers | 2 |
Barriers | 2 |
Community Colleges | 2 |
Computer Science | 2 |
More ▼ |
Source
ProQuest LLC | 4 |
Journal of Cybersecurity… | 3 |
Information Systems Education… | 2 |
Australian and International… | 1 |
Community College Journal | 1 |
Educational Technology &… | 1 |
Office of Educational… | 1 |
Author
Belshaw, Scott H. | 2 |
Babb, Jeffry S. | 1 |
Chen, Frankie | 1 |
Colaiuta, Alexandrea | 1 |
Frydenberg, Mark | 1 |
Inan, Fethi A. | 1 |
James G. Ward | 1 |
James J. Meadows III | 1 |
Jones, Keith S. | 1 |
Juan Jaime Saldana II | 1 |
Kim, Jung Seob | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Research | 6 |
Dissertations/Theses -… | 4 |
Reports - Descriptive | 3 |
Tests/Questionnaires | 1 |
Education Level
Postsecondary Education | 6 |
Higher Education | 5 |
Junior High Schools | 2 |
Middle Schools | 2 |
Secondary Education | 2 |
Two Year Colleges | 2 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Audience
Location
Texas | 13 |
Massachusetts | 2 |
Connecticut | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Juan Jaime Saldana II – ProQuest LLC, 2023
There is an ever-pressing need for cybersecurity awareness and implementation of learning strategies in the workplace to mitigate the increased threat posed by cyber-attacks and exacerbated by an untrained workforce. The lack of cybersecurity knowledge amongst government employees has increased to critical levels due to the amount of sensitive…
Descriptors: Information Security, Computer Security, Local Government, Government Employees
Richard W. Lightcap III – ProQuest LLC, 2021
Nationally, a shortage exists of qualified cybersecurity persons entering the field, posing challenges for higher education institutions in locating qualified educators to help fill the gap. A wealth of literature discusses the needs of students, yet literature outlining qualities of attracting graduates to become educators is lacking. The purpose…
Descriptors: Phenomenology, Computer Security, Career Change, Postsecondary Education
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
James J. Meadows III – ProQuest LLC, 2023
The purpose of this exploratory qualitative study was to explore the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. My study addressed whether security training for teenagers will solve the…
Descriptors: Middle School Students, Public Schools, Gamification, Educational Games
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Office of Educational Technology, US Department of Education, 2023
This is the second in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Technology Uses in Education, Educational Technology, Rural Education
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Maina, Faith; Smit, Julie; Serwadda, Abdul – Australian and International Journal of Rural Education, 2021
The research experience for teachers (RET) professional development was a six-week long summer-intensive National Science Foundation (NSF) funded project that took place at a large university in western Texas. It was designed to provide a research-rich learning environment in data science and cybersecurity for STEM teachers in the region, which is…
Descriptors: Faculty Development, Summer Programs, STEM Education, Rural Schools
Inan, Fethi A.; Namin, Akbar S.; Pogrund, Rona L.; Jones, Keith S. – Educational Technology & Society, 2016
Twenty individuals with visual impairments were surveyed in order to (a) understand their Internet use and (b) examine relations between metrics related to Internet use and cybersecurity-related knowledge, skills, confidence, and attitudes. Participants used the Internet for various purposes, including information search, communication, chatting,…
Descriptors: Internet, Computer Use, Computer Security, Visual Impairments