NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
Trends in International…1
What Works Clearinghouse Rating
Showing 1 to 15 of 28 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sam Aiello – Journal of Cybersecurity Education, Research and Practice, 2024
In today's digitally connected world, privacy has transformed from a fundamental human right into a multifaceted challenge. As technology enables the seamless exchange of information, the need to protect personal data has grown exponentially. Privacy has emerged as a critical concern in the digital age, as technological advancements continue to…
Descriptors: Privacy, Computer Security, Information Security, Technological Advancement
Peer reviewed Peer reviewed
Direct linkDirect link
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Kelly, Brian; McCormack, Mark; Reeves, Jamie; Brooks, D. Christopher; O'Brien, John – EDUCAUSE, 2021
In 2021, EDUCAUSE is publishing a second edition of the "Horizon Report." With this inaugural issue of the Information Security edition of the "Horizon Report," EDUCAUSE has sought to expand their series of Teaching and Learning "Horizon Reports" to focus on a new area of critical importance to the future of higher…
Descriptors: Information Security, Higher Education, Educational Trends, COVID-19
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Opesade, Adeola O.; Adesina, Omolayo A. – Journal of Cybersecurity Education, Research and Practice, 2020
The use of the Internet among children and adolescents is now a norm in many parts of the world. As the Internet offers a wide range of benefits to these ones, so does it expose them to possible various risks and harm. Researchers in different countries across the world have engaged in the production of relevant research-based knowledge in order…
Descriptors: Internet, Computer Security, Information Security, Children
Peer reviewed Peer reviewed
Direct linkDirect link
Bystrova, Bogdana – Comparative Professional Pedagogy, 2017
At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of…
Descriptors: Comparative Analysis, Bachelors Degrees, Computer Security, Foreign Countries
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Hackney, Dennis W. G. – ProQuest LLC, 2011
Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…
Descriptors: Computer Security, Risk Management, Information Systems, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro – Journal of Policy Analysis and Management, 2011
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
Descriptors: Identification (Psychology), Access to Information, Deception, Computer Security
Warfield, Douglas L. – ProQuest LLC, 2011
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Descriptors: Information Technology, Industry, Computer Security, Governance
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wu, Yejun – Journal of Education for Library and Information Science, 2013
This paper addresses the curriculum overlap and gap between LIS education and intelligence education by analyzing the content of the websites of the intelligence education programs and courses in 27 representative intelligence education universities in the United States, and the intelligence-related programs and courses in the 56 LIS programs in…
Descriptors: Library Science, Library Education, Web Sites, Computer Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Business Roundtable, 2012
America faces many challenges in working together to restore the promise of economic growth and security for the country, U.S. families and the American worker. The challenges are both real and serious. Despite hopeful signs of economic recovery, America remains mired in the deepest jobs crisis since the 1930s. One out of every 12 Americans who…
Descriptors: Economic Climate, Labor Market, Unemployment, Economic Progress
Peer reviewed Peer reviewed
Direct linkDirect link
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Previous Page | Next Page ยป
Pages: 1  |  2