Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 5 |
Higher Education | 5 |
National Security | 5 |
Computer Science Education | 2 |
Crime Prevention | 2 |
Federal Government | 2 |
Information Security | 2 |
Privacy | 2 |
Public Agencies | 2 |
Access to Information | 1 |
Barriers | 1 |
More ▼ |
Source
EDUCAUSE Review | 2 |
Chronicle of Higher Education | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Author
Basken, Paul | 1 |
Knapp, Kenneth J. | 1 |
Luker, Mark A. | 1 |
Maurer, Christopher | 1 |
Plachkinova, Miloslava | 1 |
Rose, Linwood H. | 1 |
Tsado, Lucy | 1 |
Publication Type
Journal Articles | 5 |
Information Analyses | 2 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 1 |
Audience
Location
District of Columbia | 1 |
Maryland | 1 |
Massachusetts | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Tsado, Lucy – Journal of Cybersecurity Education, Research and Practice, 2019
The human resource skills gap in cybersecurity has created an opportunity for educational institutions interested in cybersecurity education. The current number of schools designated by the Department of Homeland Security (DHS) and National Security Agency (NSA) as Centers of Academic Excellence (CAE) to train cybersecurity experts are not…
Descriptors: Information Security, National Security, Computer Security, Computer Science Education
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security
Rose, Linwood H. – EDUCAUSE Review, 2004
Protecting the critical infrastructure of this country is essential to the preservation of lives as they are now lived. The time has come for leaders in higher education to recognize and creatively respond to the opportunity and realities of protecting the national critical infrastructure. To do this effectively, the academy must embrace and…
Descriptors: College Faculty, Computer Security, Higher Education, College Role