Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Information Security | 5 |
Internet | 4 |
Knowledge Level | 3 |
Computer Mediated… | 2 |
Computer Networks | 2 |
Handheld Devices | 2 |
Law Enforcement | 2 |
Majors (Students) | 2 |
School Policy | 2 |
Telecommunications | 2 |
More ▼ |
Source
Information Systems Education… | 2 |
Journal of Cybersecurity… | 2 |
Australian and International… | 1 |
EDUCAUSE Quarterly | 1 |
Educational Technology &… | 1 |
Author
Babb, Jeffry S. | 1 |
Belshaw, Scott H. | 1 |
Chen, Frankie | 1 |
Frydenberg, Mark | 1 |
Inan, Fethi A. | 1 |
James G. Ward | 1 |
Jones, Keith S. | 1 |
Kim, Jung Seob | 1 |
Li-Jen Lester | 1 |
Maina, Faith | 1 |
McDermott, Isabelle | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 7 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Texas | 7 |
Massachusetts | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Maina, Faith; Smit, Julie; Serwadda, Abdul – Australian and International Journal of Rural Education, 2021
The research experience for teachers (RET) professional development was a six-week long summer-intensive National Science Foundation (NSF) funded project that took place at a large university in western Texas. It was designed to provide a research-rich learning environment in data science and cybersecurity for STEM teachers in the region, which is…
Descriptors: Faculty Development, Summer Programs, STEM Education, Rural Schools
Inan, Fethi A.; Namin, Akbar S.; Pogrund, Rona L.; Jones, Keith S. – Educational Technology & Society, 2016
Twenty individuals with visual impairments were surveyed in order to (a) understand their Internet use and (b) examine relations between metrics related to Internet use and cybersecurity-related knowledge, skills, confidence, and attitudes. Participants used the Internet for various purposes, including information search, communication, chatting,…
Descriptors: Internet, Computer Use, Computer Security, Visual Impairments
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy