NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 15 results Save | Export
Matthew L. McFadden – ProQuest LLC, 2021
Identifying and cultivating cybersecurity leaders is paramount to building and strengthening the cybersecurity workforce. These skilled cybersecurity leaders are critical for leading effective cybersecurity teams and defending organizations against ever-increasing cyber threats. This research study analyzed cybersecurity professionals' preparation…
Descriptors: Internet, Computer Security, Leadership Training, Professional Personnel
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Humayun Zafar; Carole L. Hollingsworth; Tridib Bandyopadhyay; Adriane B. Randolph – Journal of Cybersecurity Education, Research and Practice, 2024
This research article examines conversations happening between cybersecurity academics and industry leaders with a goal to improve the development of cybersecurity professionals. We specifically focus on efforts in the Southeast region of the United States. The discussion features insights from a panel consisting of an academic cybersecurity…
Descriptors: Computer Security, Career Pathways, Computer Science Education, Industry
Letitia Griffin – ProQuest LLC, 2021
The purpose of this study is to add to the body of knowledge regarding the impact of cybersecurity awareness training programs and how effective and efficient the program is in DoD affiliated organizations. The general problem addressed in the present study was that there has been an increase in security breaches within Department of Defense (DoD)…
Descriptors: Computer Security, Information Security, Government Employees, Information Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Matt Paulson – ProQuest LLC, 2021
With the recent proliferation of information technology, almost all users of technology, no matter the field, profession, or status, have experienced a commensurate increase in information security threats. This, in turn, creates a significant concern in higher institutions of public learning. Information Security Officers in public higher…
Descriptors: Higher Education, Information Security, Computer Security, Information Policy
Office of Educational Technology, US Department of Education, 2023
Digital learning is defined as "any instructional practice that effectively uses technology to strengthen a student's learning experience and encompasses a wide spectrum of tools and practices." This "School Leader Digital Learning Guide" is a resource to help school leaders consider, plan, fund, implement, maintain, and adapt…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Office of Educational Technology, US Department of Education, 2017
This guide provides practical, actionable information intended to help both technical personnel and educational leaders navigate the many decisions required to deliver broadband connectivity to students. It presents a variety of options for school and district leaders to consider when making technology infrastructure decisions, recognizing that…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
California Community Colleges, Chancellor's Office, 2014
This 16th annual report highlights up-to-date information on the programs supported through the Chancellor's Office Telecommunications and Technology Infrastructure Program (TTIP). To summarize 2012-13, one would describe it as a year of planning and preparation. The system-wide budget cuts of the past few years, reports of impacted classes, staff…
Descriptors: Community Colleges, Telecommunications, Technology Integration, Technology Uses in Education
Linworth, 2012
If you're new to running a library or looking for a refresher, this book can serve as your first reference source for school library operation, providing overview information on a wealth of topics, lists of resources for more in-depth information, and coverage of current topics such as Web 2.0, fundraising, digital booktalks, and cybersafety.…
Descriptors: Fund Raising, Library Administration, School Libraries, Library Automation
Peer reviewed Peer reviewed
Direct linkDirect link
Campbell, John P.; Oblinger, Diana G. – EDUCAUSE Quarterly, 2007
The EDUCAUSE Advisory Committee for Teaching and Learning (ACTL) has identified the key technology-related teaching and learning issues in higher education for 2007. The 10 important teaching and learning issues are: (1) Establishing and supporting a culture of evidence; (2) Demonstrating improvement of learning; (3) Translating learning…
Descriptors: College Instruction, Validity, Educational Improvement, Theory Practice Relationship
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
Northwest Educational Technology Consortium, Portland, OR. – 1996
This videotape, a two-hour follow-up to the earlier "Get Wired: Designing Your School Network" teleconference, presents issues in implementing and maintaining a network. Program segments on network management, training and professional development, security and access, and growing the network are addressed by a panel of educators from…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design