NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Descriptive14
Journal Articles13
Education Level
Two Year Colleges14
Higher Education8
Postsecondary Education6
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Peer reviewed Peer reviewed
Direct linkDirect link
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Parry, Marc – Chronicle of Higher Education, 2009
If you work at a community college that teaches cybersecurity, it pays to be located in the backyard of a spy agency. Just don't ask Kelly A. Koermer, administrator of the Anne Arundel Community College, what's inside those dark towers at Fort Meade. She points out other highlights of the restricted region: an employees-only exit off the highway,…
Descriptors: Community Colleges, Internet, Computer Security, National Security
Peer reviewed Peer reviewed
Direct linkDirect link
Shelton, Kay – Community & Junior College Libraries, 2009
The media often report on the negativity of Facebook, with horror stories of people losing their jobs because of something they posted. There can be useful purposes for Facebook, however, especially after the unthinkable happens on a college campus. Community college libraries can incorporate Facebook into their security planning.
Descriptors: Community Colleges, College Libraries, Social Networks, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Brobst, Jan; Council, Chip – Community College Journal, 2005
The discussion in this article is intended to provide an examination of why top management, IT management, and internal auditors should be interested in IT governance. Some aspects of IT management will be described including implementation, auditing, availability, security, and alignment. One governance framework, COBIT, will be utilized as a…
Descriptors: Audits (Verification), Information Technology, Administration, Governance
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Martin, James; Samels, James E. – Chronicle of Higher Education, 2007
College and university presidents are increasingly called upon to make informed choices about technology. The rapidly shifting landscape makes it tough to keep up with change and innovation, let alone stay ahead of the curve. In this article, the authors discuss 10 trends to watch in campus technology. These trends are the following: (1) increased…
Descriptors: Educational Trends, Information Technology, Partnerships in Education, Proprietary Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Lawhon, Tommie; Ennis-Cole, Demetria; Lawhon, David C. – Community College Journal of Research & Practice, 2006
Practical information on the necessity for community colleges, instructors, and students to understand and abide by the copyright laws is essential. Whether developing, structuring, maintaining, or presenting courses, or instructing students on the development of their own papers, one must be knowledgeable about plagiarism, the Fair Use Act, and…
Descriptors: Copyrights, Plagiarism, Distance Education, Community Colleges
American Association of Community Colleges (NJ1), 2006
This publication includes 13 articles: (1) ATE [Advanced Technological Education] Attuned to Global Competition; (2) Materials Science Center Supplies Information on Often-Overlooked Field; (3) CSEC [Cyber Security Education Consortium] Builds Corps of Cyber Technicians; (4) KCTCS [Kentucky Community and Technical College System] Is U.S. Partner…
Descriptors: Technology Education, Technical Education, Community Colleges, Faculty Development