Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Information Security | 3 |
Barriers | 2 |
Computer Science Education | 2 |
Computer Software | 2 |
Electronic Mail | 2 |
Engineering Education | 2 |
Labor Force | 2 |
Risk | 2 |
COVID-19 | 1 |
Campuses | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 2 |
Advances in Engineering… | 1 |
Community College Journal | 1 |
Technology & Learning | 1 |
Author
Batchelor, John H. | 1 |
Bhunia, Swarup | 1 |
Burch, Gerald F. | 1 |
Cherrise Ficke | 1 |
Fezzey, Tyler | 1 |
Finkel, Ed | 1 |
Isabella Piasecki | 1 |
Maria Chaparro Osman | 1 |
Maureen Namukasa | 1 |
Meredith Carroll | 1 |
Paul, Shubhra Deb | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Descriptive | 2 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Two Year Colleges | 1 |
Audience
Location
Florida | 5 |
New Mexico | 1 |
Wyoming | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Maria Chaparro Osman; Maureen Namukasa; Cherrise Ficke; Isabella Piasecki; T. J. O'Connor; Meredith Carroll – Journal of Cybersecurity Education, Research and Practice, 2023
A robust cybersecurity workforce is critical for protection against a range of malicious attacks. However, it has been noted that there are many vacancies and a shortage of individuals entering the cybersecurity workforce. This workforce shortage has partly been attributed to the lack of diversity in the cybersecurity field, with women, African…
Descriptors: Diversity (Institutional), Labor Force, Computer Security, Disproportionate Representation
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Technology & Learning, 2008
In this article, four directors discuss the security challenges that keep them worried and what they do about it. Dwayne Alton describes how his school district, IT School District of Lee County, Fort Meyers, Florida, collaborated with Cisco and installed an intrusion detection system which alerts IT staff when someone creates their own access…
Descriptors: Computer Security, School Districts, Information Technology, Computer Software