NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 17 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Childs, Dawn – ProQuest LLC, 2023
Cyberattacks in the United States have consistently increased over recent years, and there is no apparent end to this upward trend. The increase in these attacks has resulted in successful cyber incidents and breaches of large, small, and medium-sized organizations across varied locales and industries. The hospitality industry has not been immune…
Descriptors: Hospitality Occupations, Professional Education, Curriculum, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bowen, Debra; Jaurez, James; Jones, Nancy; Reid, William; Simpson, Christopher – Journal of Cybersecurity Education, Research and Practice, 2022
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational…
Descriptors: Computer Security, Information Security, Educational Resources, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jason H. Sharp; John E. Anderson; Guido Lang – Information Systems Education Journal, 2025
The "Information Systems Education Journal" has published uninterrupted since 2003. Over its publication history, it has covered myriad topics related to information systems education including model curriculum, outcomes assessment, online learning, capstone courses, service learning, data analytics, and cybersecurity, just to name a…
Descriptors: Information Systems, Computer Science Education, Educational Research, Bibliometrics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kellie Johnson; Tiffany Drape; Joseph Oakes; Joseph Simpson; Anne M. Brown; Donna Westfall-Rudd – Journal of Cybersecurity Education, Research and Practice, 2024
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the 'hidden curriculum' of seeking internships and jobs. Exposing students through…
Descriptors: Agriculture, Biological Sciences, Curriculum, Biological Influences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Martin, Nancy; Woodward, Belle – Information Systems Education Journal, 2013
Now more than ever, cybersecurity professionals are in demand and the trend is not expected to change anytime soon. Currently, only a small number of educational programs are funded and equipped to educate cybersecurity professionals and those few programs cannot train a workforce of thousands in a relatively short period of time. Moreover, not…
Descriptors: Computer Security, Labor Force Development, Hands on Science, Experiential Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wu, Yejun – Journal of Education for Library and Information Science, 2013
This paper addresses the curriculum overlap and gap between LIS education and intelligence education by analyzing the content of the websites of the intelligence education programs and courses in 27 representative intelligence education universities in the United States, and the intelligence-related programs and courses in the 56 LIS programs in…
Descriptors: Library Science, Library Education, Web Sites, Computer Literacy
Suppo, Chris A. – ProQuest LLC, 2013
The purpose of this study was to investigate digital citizenship in Pennsylvania public schools based on the responses of school leaders including superintendents, curriculum coordinators, and technology coordinators. This study examined the relationship between Pennsylvania school leader's beliefs and the implementation of digital citizenship…
Descriptors: Public Schools, Administrator Attitudes, Correlation, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Du, Wenliang; Wang, Ronghua – Journal on Educational Resources in Computing, 2008
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
Descriptors: Computer Security, Laboratories, Computers, Computer Science
Bailey, Gerald D. – Learning & Leading with Technology, 1997
School administrators consider themselves technology leaders, but few would claim they know all there is to know. This article examines 10 concepts for technology integration in 21st-century schools: change, technology planning, ethics, teaching and learning, safety and security, curriculum, staff development, infrastructure, technical support,…
Descriptors: Administrators, Change, Computer Security, Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Teles, Elizabeth J.; Hovis, R. Corby – Community College Journal, 2002
Describes recent federal legislation (H.R. 3394) that charges the National Science Foundation with offering more grants to colleges and universities for degree programs in computer and network security, and to establish trainee programs for graduate students who pursue doctoral degrees in computer and network security. Discusses aspects of…
Descriptors: College Role, Community Colleges, Computer Security, Crime
Previous Page | Next Page ยป
Pages: 1  |  2