Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 5 |
Risk Management | 5 |
Access to Information | 2 |
Computer Software | 2 |
Information Security | 2 |
Internet | 2 |
Adult Education | 1 |
Adults | 1 |
Attitude Measures | 1 |
Barriers | 1 |
Case Studies | 1 |
More ▼ |
Source
EDUCAUSE Quarterly | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Learning, Media and Technology | 1 |
New America | 1 |
Author
Alper Yayla | 1 |
Anderson, Jimmeka | 1 |
Chou, Te-Shun | 1 |
Fisk, Nathan | 1 |
Guernsey, Lisa | 1 |
Hempenius, Nicholas | 1 |
Hope, Andrew | 1 |
Mohammed Salem Al-Atoum | 1 |
Muhammad Al-Abdullah | 1 |
Rezmierski, Virginia | 1 |
Rothschild, Daniel | 1 |
More ▼ |
Publication Type
Reports - Evaluative | 5 |
Journal Articles | 4 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Adult Education | 1 |
Elementary Secondary Education | 1 |
Audience
Location
Florida | 1 |
Michigan | 1 |
United Kingdom | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Hope, Andrew – Learning, Media and Technology, 2013
Despite widespread internet provision in UK schools, there is little evidence to suggest resultant, sustained educational benefit. Drawing upon the notion of over-blocking, this paper explores how narrow notions of digital learning and over-zealous responses to internet risks limit students' educational experience. It is argued that this…
Descriptors: Foreign Countries, Educational Technology, Internet, Computer Security
Rothschild, Daniel; Rezmierski, Virginia – EDUCAUSE Quarterly, 2004
The Computer Incident Factor Analysis and Categorization (CIFAC) Project at the University of Michigan began in September 2003 with grants from EDUCAUSE and the National Science Foundation (NSF). The project's primary goal is to create a best-practices security framework for colleges and universities based on rigorous quantitative analysis of…
Descriptors: Computer Security, Colleges, Statistical Analysis, Literature Reviews