Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 8 |
Descriptor
Source
Journal of Cybersecurity… | 2 |
Campus Technology | 1 |
Community College Journal | 1 |
EDUCAUSE Quarterly | 1 |
Educational Technology &… | 1 |
Information Systems Education… | 1 |
Office of Educational… | 1 |
Author
Babb, Jeffry S. | 1 |
Belshaw, Scott H. | 1 |
Chen, Frankie | 1 |
Colaiuta, Alexandrea | 1 |
Frydenberg, Mark | 1 |
Inan, Fethi A. | 1 |
Jones, Keith S. | 1 |
Kim, Jung Seob | 1 |
McDermott, Isabelle | 1 |
Namin, Akbar S. | 1 |
Nodeland, Brooke | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 4 |
Reports - Research | 4 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Two Year Colleges | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Texas | 8 |
Massachusetts | 3 |
Arizona | 1 |
California | 1 |
Connecticut | 1 |
New Jersey | 1 |
North Carolina | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Office of Educational Technology, US Department of Education, 2023
This is the second in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Technology Uses in Education, Educational Technology, Rural Education
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Inan, Fethi A.; Namin, Akbar S.; Pogrund, Rona L.; Jones, Keith S. – Educational Technology & Society, 2016
Twenty individuals with visual impairments were surveyed in order to (a) understand their Internet use and (b) examine relations between metrics related to Internet use and cybersecurity-related knowledge, skills, confidence, and attitudes. Participants used the Internet for various purposes, including information search, communication, chatting,…
Descriptors: Internet, Computer Use, Computer Security, Visual Impairments
Campus Technology, 2007
This article profiles the winners of this year's competition for outstanding technology innovation on US college and university campuses. The winners are: (1) Rice University, Texas (virtualized networks); (2) Drexel University, Pennsylvania (rich media); (3) Harvard Business School, Massachusetts (network management); (4) Louisiana State…
Descriptors: Educational Innovation, Awards, Emergency Programs, Higher Education
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy