Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 6 |
Computer Security | 6 |
Training | 6 |
Best Practices | 2 |
Computer Uses in Education | 2 |
Foreign Countries | 2 |
Information Security | 2 |
Teamwork | 2 |
Barriers | 1 |
College Students | 1 |
Competition | 1 |
More ▼ |
Author
Carlin, Anna | 1 |
Lobodzinski, Suave, Ed. | 1 |
Manson, Daniel P. | 1 |
Massie, Malcom | 1 |
Nielson, Seth James | 1 |
Rene Ekoteson | 1 |
Riley, Stan | 1 |
Tomek, Ivan, Ed. | 1 |
Zhu, Jake | 1 |
Publication Type
Journal Articles | 3 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Audience
Location
Australia | 1 |
California | 1 |
Cameroon | 1 |
Maryland (Baltimore) | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Nielson, Seth James – Computer Science Education, 2017
Attempting to educate practitioners of computer security can be difficult if for no other reason than the breadth of knowledge required today. The security profession includes widely diverse subfields including cryptography, network architectures, programming, programming languages, design, coding practices, software testing, pattern recognition,…
Descriptors: Computer Security, Simulation, Graduate Students, Training
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization

Massie, Malcom – Orana, 1996
Scotch College (Adelaide, Australia) has networked 90% of its classrooms. This article describes the campus computer network and its hardware and configuration; World Wide Web problems and solution; a "mini Internet" of curriculum-specific materials gathered from the Web; student and faculty use; student and staff training; security;…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology
Lobodzinski, Suave, Ed.; Tomek, Ivan, Ed. – 1997
The 1997 WebNet conference addressed research, new developments, and experiences related to the Internet and intranets. The 257 contributions of WebNet 97 contained in this proceedings comprise the full and short papers accepted for presentation at the conference. Included are positions papers by leading experts in the field; descriptions of ideas…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Computer System Design