Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 12 |
Descriptor
Source
Author
Payne, Brian K. | 3 |
Vandecar-Burdin, Tancy | 2 |
Amundson, Kristen | 1 |
Anne M. Brown | 1 |
B. Bagby | 1 |
Conley, Stephanie Scheer | 1 |
Cross, Bria | 1 |
Eric K. Kaufman | 1 |
Feras A. Batarseh | 1 |
Foster, Andrea L. | 1 |
Heather Lindberg | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 4 |
Reports - Research | 4 |
Collected Works - Proceedings | 2 |
Books | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 6 |
Elementary Secondary Education | 2 |
Two Year Colleges | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Grade 1 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Administrators | 1 |
Location
Virginia | 12 |
Kentucky | 3 |
Maryland | 3 |
Indiana | 2 |
North Carolina | 2 |
Ohio | 2 |
Washington | 2 |
West Virginia | 2 |
Wisconsin | 2 |
Alabama | 1 |
Albania | 1 |
More ▼ |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Every Student Succeeds Act… | 1 |
Individuals with Disabilities… | 1 |
Social Security | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Samson O. Adeoye; Heather Lindberg; B. Bagby; Anne M. Brown; Feras A. Batarseh; Eric K. Kaufman – NACTA Journal, 2023
Cyberbiosecurity is an emerging field at the convergence of life sciences and the digital world. As technological advances improve operational processes and expose them to vulnerabilities in agriculture and life sciences, cyberbiosecurity has become increasingly important for addressing contemporary concerns. Unfortunately, at this time,…
Descriptors: Computer Security, Biology, Biological Sciences, Labor Force Development
Payne, Brian K.; Cross, Bria; Vandecar-Burdin, Tancy – Journal of Cybersecurity Education, Research and Practice, 2022
The value of academic advising has been increasingly emphasized in higher education. In this study, attention is given to the most significant types of advice that a sample of cybersecurity faculty and advisors from the Commonwealth of Virginia recommend giving to cybersecurity students. The results show that faculty and advisors recommended that…
Descriptors: Faculty Advisers, Academic Advising, Computer Security, Experience
Amundson, Kristen; Ko, Andrew – State Education Standard, 2021
The COVID-19 school closures offered states and local school districts an opportunity to reimagine education--to tailor it to meet students' needs, support teachers and aid their professional development, keep schools safe, and better support families. Thus far, not a lot of imagination is on display. In particular, schools are not taking…
Descriptors: Educational Change, Technology Uses in Education, Distance Education, Influence of Technology
Pitman, Lora; Payne, Brian K.; Vandecar-Burdin, Tancy; Thorbjornsen, Lenora – Journal of Cybersecurity Education, Research and Practice, 2022
As the number of available cybersecurity jobs continues to grow, colleges strive to offer to their cybersecurity students an environment which will make them sufficiently prepared to enter the workforce after graduation. This paper explores the academic and professional needs of STEM-students in various higher education institutions across…
Descriptors: College Students, STEM Education, Computer Security, Information Security
National Forum on Education Statistics, 2022
Digital inequity has been a long-standing issue in the education community. A lack of home internet and technology devices can not only hinder students' ability to access educational resources at home, but can also have a detrimental effect on student achievement. Education agencies have taken steps over the past decades to address digital…
Descriptors: Access to Computers, Technology Uses in Education, Educational Technology, Internet
Payne, Brian K.; Mayes, Lisa; Paredes, Tisha; Smith, Elizabeth; Wu, Hongyi; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
The Center for Cybersecurity Education and Research at Old Dominion University has expanded its use of high impact practices in the university's undergraduate cybersecurity degree program. Strategies developed to promote student learning included learning communities, undergraduate research, a robust internship program, service learning, and…
Descriptors: Interdisciplinary Approach, Information Security, Computer Security, Information Science Education
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information
McSwain-Starrett, Lauren T.; Conley, Stephanie Scheer – EDUCAUSE Quarterly, 2011
Student computing is now mobile. For college students across the nation, convenient access to information--anytime, anywhere, on demand--has become not only a priority, but a necessity. To successfully serve the needs of this current generation of students, colleges and universities must recognize the trend and align services accordingly.…
Descriptors: College Students, Access to Information, Handheld Devices, Computer Software
Pierce, Steven Russell – ProQuest LLC, 2009
Information technology (IT) certifiers evaluate risk and develop mitigations ensuring IT infrastructures remain protected within acceptable levels of operation, which if not properly maintained can potentially result in loss of life within Department of Defense (DoD) and federal environments. This qualitative phenomenological exploratory study…
Descriptors: Data Analysis, Certification, Internet, Information Technology
American Association of Community Colleges (NJ1), 2006
This publication includes 13 articles: (1) ATE [Advanced Technological Education] Attuned to Global Competition; (2) Materials Science Center Supplies Information on Often-Overlooked Field; (3) CSEC [Cyber Security Education Consortium] Builds Corps of Cyber Technicians; (4) KCTCS [Kentucky Community and Technical College System] Is U.S. Partner…
Descriptors: Technology Education, Technical Education, Community Colleges, Faculty Development