Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 7 |
Crime | 7 |
Terrorism | 7 |
Community Colleges | 5 |
Safety | 5 |
Two Year Colleges | 5 |
National Security | 4 |
Crime Prevention | 3 |
Information Technology | 3 |
Biology | 2 |
College Role | 2 |
More ▼ |
Author
Blezard, Rob | 1 |
Conley-Ware, Lakita D. | 1 |
Gamble, Cheryl | 1 |
Hovis, R. Corby | 1 |
Johnson, Elaine A. | 1 |
Plachkinova, Miloslava | 1 |
Schmidt, Howard | 1 |
Teles, Elizabeth J. | 1 |
Vo, Ace | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 5 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Iran | 1 |
Ukraine | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Conley-Ware, Lakita D. – ProQuest LLC, 2010
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Descriptors: Crime, Terrorism, Identification, Computer Security
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Teles, Elizabeth J.; Hovis, R. Corby – Community College Journal, 2002
Describes recent federal legislation (H.R. 3394) that charges the National Science Foundation with offering more grants to colleges and universities for degree programs in computer and network security, and to establish trainee programs for graduate students who pursue doctoral degrees in computer and network security. Discusses aspects of…
Descriptors: College Role, Community Colleges, Computer Security, Crime
Johnson, Elaine A. – Community College Journal, 2002
Describes Bio-Link, the Advanced Technological Education (ATE) Center for Biotechnology established with funding from the National Science Foundation (NSF). Reports that Bio-Link, headquartered at City College of San Francisco, has created a national network and resource base for community colleges, industry, and others interested in biotechnology…
Descriptors: Biology, Biotechnology, Community Colleges, Computer Security
Schmidt, Howard – Community College Journal, 2002
Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…
Descriptors: Community Colleges, Computer Security, Crime, Emergency Programs
Blezard, Rob – Community College Journal, 2002
Discusses ways in which community colleges are lending their expertise and experience to help make the nation safer after the September 11th attacks. Reports that community colleges are instituting public safety and cybersecurity measures on their campuses and teaching others to do the same. Adds that community colleges are also training public…
Descriptors: College Role, Community Colleges, Computer Security, Crime