Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 11 |
National Security | 11 |
Terrorism | 6 |
Community Colleges | 5 |
Crime | 4 |
Safety | 4 |
Two Year Colleges | 4 |
Crime Prevention | 3 |
Government Role | 3 |
Information Technology | 3 |
Internet | 3 |
More ▼ |
Source
Community College Journal | 5 |
Chronicle of Higher Education | 2 |
Business-Higher Education… | 1 |
EDUCAUSE Review | 1 |
Quarterly Journal of Speech | 1 |
US Department of Homeland… | 1 |
Author
Gamble, Cheryl | 2 |
Basken, Paul | 1 |
Blezard, Rob | 1 |
Hartnett, Stephen John | 1 |
Johnson, Elaine A. | 1 |
Luker, Mark A. | 1 |
Parry, Marc | 1 |
Schmidt, Howard | 1 |
Publication Type
Reports - Descriptive | 11 |
Journal Articles | 9 |
Education Level
Adult Education | 3 |
Higher Education | 2 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Business-Higher Education Forum, 2014
The Business-Higher Education Forum (BHEF) has achieved particular success in operationalizing the National Higher Education and Workforce Initiative (HEWI) in Maryland around cybersecurity. Leveraging its membership of corporate CEOs, university presidents, and government agency leaders, BHEF partnered with the University System of Maryland to…
Descriptors: Internet, Computer Security, Corporations, College Presidents
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Parry, Marc – Chronicle of Higher Education, 2009
If you work at a community college that teaches cybersecurity, it pays to be located in the backyard of a spy agency. Just don't ask Kelly A. Koermer, administrator of the Anne Arundel Community College, what's inside those dark towers at Fort Meade. She points out other highlights of the restricted region: an employees-only exit off the highway,…
Descriptors: Community Colleges, Internet, Computer Security, National Security
US Department of Homeland Security, 2009
The overarching goal of the National Infrastructure Protection Plan (NIPP) is to build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation's critical infrastructure and key resources (CIKR)…
Descriptors: National Security, Resources, Terrorism, Natural Disasters
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security
Gamble, Cheryl – Community College Journal, 2005
The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…
Descriptors: Technological Advancement, National Security, Security (Psychology), Computer Security
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Johnson, Elaine A. – Community College Journal, 2002
Describes Bio-Link, the Advanced Technological Education (ATE) Center for Biotechnology established with funding from the National Science Foundation (NSF). Reports that Bio-Link, headquartered at City College of San Francisco, has created a national network and resource base for community colleges, industry, and others interested in biotechnology…
Descriptors: Biology, Biotechnology, Community Colleges, Computer Security
Schmidt, Howard – Community College Journal, 2002
Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…
Descriptors: Community Colleges, Computer Security, Crime, Emergency Programs
Blezard, Rob – Community College Journal, 2002
Discusses ways in which community colleges are lending their expertise and experience to help make the nation safer after the September 11th attacks. Reports that community colleges are instituting public safety and cybersecurity measures on their campuses and teaching others to do the same. Adds that community colleges are also training public…
Descriptors: College Role, Community Colleges, Computer Security, Crime