Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 7 |
Crime | 7 |
Risk Management | 7 |
Information Security | 5 |
Best Practices | 2 |
Community Colleges | 2 |
Computer Science Education | 2 |
Computer Software | 2 |
Higher Education | 2 |
Information Technology | 2 |
Prevention | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
Community College Journal | 1 |
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Author
Chou, Te-Shun | 1 |
Christopher D. Adams | 1 |
Cooper, Paul K. | 1 |
Haywood, M. Elizabeth | 1 |
Hempenius, Nicholas | 1 |
Ladwig, Christine | 1 |
Schmidt, Howard | 1 |
Schwieger, Dana | 1 |
Zhao, Mingyi | 1 |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Two Year Colleges | 1 |
Audience
Location
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Haywood, M. Elizabeth – Journal of Information Systems Education, 2021
ISACA, a non-profit, independent association that advocates for professionals involved in information security, assurance, risk management, and governance, recently updated its IT governance framework, Control Objectives for Information and Related Technology (COBIT). COBIT 2019 presents a logical approach to information technology and policy…
Descriptors: Community Colleges, Crime, Computer Security, Information Technology
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Cooper, Paul K. – ProQuest LLC, 2017
There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…
Descriptors: Information Security, Crime, Computer Security, Risk
Schmidt, Howard – Community College Journal, 2002
Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…
Descriptors: Community Colleges, Computer Security, Crime, Emergency Programs