NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security