Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Networks | 5 |
Computer Security | 5 |
Information Security | 3 |
Internet | 3 |
Educational Technology | 2 |
Barriers | 1 |
Best Practices | 1 |
Business Schools | 1 |
Certification | 1 |
College Students | 1 |
Community Colleges | 1 |
More ▼ |
Source
Community College Journal | 1 |
EDUCAUSE Quarterly | 1 |
Information Systems Education… | 1 |
ProQuest LLC | 1 |
T.H.E. Journal | 1 |
Author
Babb, Jeffry S. | 1 |
Chen, Frankie | 1 |
Frydenberg, Mark | 1 |
McDermott, Isabelle | 1 |
OConnell, Jake | 1 |
Pierce, Dennis | 1 |
Riley, Stan | 1 |
Waguespack, Leslie J. | 1 |
Waters, John K. | 1 |
Wolff, Bill | 1 |
Yates, David J. | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Texas | 5 |
Massachusetts | 2 |
Connecticut | 1 |
Nevada | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy