Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 15 |
Descriptor
Computer Networks | 20 |
Computer Security | 20 |
Crime Prevention | 20 |
Information Technology | 7 |
Internet | 5 |
Computer Software | 4 |
Information Security | 4 |
School Districts | 4 |
Higher Education | 3 |
Models | 3 |
Privacy | 3 |
More ▼ |
Source
Author
Anderson, John A. | 1 |
Ashford, Tina | 1 |
Blakely, Benjamin A. | 1 |
Borja, Rhea R. | 1 |
Carl, Noah | 1 |
Carlin, Anna | 1 |
Council, Chip | 1 |
Dark, Melissa | 1 |
Giacobe, Nicklaus A. | 1 |
Li, Chengcheng | 1 |
Luker, Mark A. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 13 |
Journal Articles | 12 |
Dissertations/Theses -… | 4 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 2 |
Guides - General | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Administrators | 2 |
Media Staff | 1 |
Parents | 1 |
Policymakers | 1 |
Location
California | 2 |
Arizona | 1 |
Florida | 1 |
Ohio | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
This paper will discuss some assignments using freeware/shareware instructors can find on the Web to use to provide students with hands-on experience in this arena. Also, the college, Palm Beach State College, via a grant with the U.S. Department of Labor, has recently purchased a unique cyber security device that simulates cyber security attacks…
Descriptors: Computer Security, Computer Software, Assignments, College Students
Blakely, Benjamin A. – ProQuest LLC, 2012
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Descriptors: Computer Security, Information Technology, Crime, Crime Prevention
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Wilson, Joe M. – ProQuest LLC, 2013
This dissertation uses design science research and engineering to develop a cloud-based simulator for modeling next-generation cybersecurity protection frameworks in the United States. The claim is made that an agile and neutral framework extending throughout the cyber-threat plane is needed for critical infrastructure protection (CIP). This…
Descriptors: Computer Security, Information Security, Engineering, Computer Simulation
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Borja, Rhea R. – Education Week, 2006
While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…
Descriptors: Computer Security, Computer Networks, Students, Crime
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Previous Page | Next Page ยป
Pages: 1 | 2