Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 8 |
Since 2016 (last 10 years) | 17 |
Since 2006 (last 20 years) | 23 |
Descriptor
Information Security | 23 |
Computer Security | 12 |
Internet | 7 |
Privacy | 7 |
Educational Technology | 5 |
Access to Computers | 4 |
Educational Policy | 4 |
Knowledge Level | 4 |
Online Courses | 4 |
Program Implementation | 4 |
State Policy | 4 |
More ▼ |
Source
Author
Belshaw, Scott H. | 2 |
Babb, Jeffry S. | 1 |
Chen, Frankie | 1 |
Chithambo, Loyce Maosa | 1 |
Colaiuta, Alexandrea | 1 |
Erika Celeste Vershon | 1 |
Fox, Christine | 1 |
Frydenberg, Mark | 1 |
Garcia, Deyanira | 1 |
Gemin, Butch | 1 |
Jabarkhail, Sami | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 8 |
Reports - Descriptive | 7 |
Dissertations/Theses -… | 6 |
Reports - Evaluative | 2 |
Legal/Legislative/Regulatory… | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 12 |
Postsecondary Education | 12 |
Elementary Secondary Education | 5 |
Middle Schools | 4 |
Secondary Education | 4 |
High Schools | 3 |
Junior High Schools | 3 |
Two Year Colleges | 3 |
Elementary Education | 1 |
Audience
Policymakers | 2 |
Researchers | 1 |
Students | 1 |
Location
Texas | 23 |
Florida | 4 |
Indiana | 4 |
California | 3 |
Illinois | 3 |
Massachusetts | 3 |
Missouri | 3 |
Michigan | 2 |
Minnesota | 2 |
Nebraska | 2 |
North Carolina | 2 |
More ▼ |
Laws, Policies, & Programs
Elementary and Secondary… | 1 |
Assessments and Surveys
Florida Comprehensive… | 1 |
What Works Clearinghouse Rating
Juan Jaime Saldana II – ProQuest LLC, 2023
There is an ever-pressing need for cybersecurity awareness and implementation of learning strategies in the workplace to mitigate the increased threat posed by cyber-attacks and exacerbated by an untrained workforce. The lack of cybersecurity knowledge amongst government employees has increased to critical levels due to the amount of sensitive…
Descriptors: Information Security, Computer Security, Local Government, Government Employees
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Erika Celeste Vershon – ProQuest LLC, 2024
For students to fully understand the long-lasting consequences of responsible or irresponsible digital citizenship in the world of online personal and classroom learning, teachers and students need to formally engage with formal lessons on digital citizenship skills as we societally become more dependent on technology daily. Teacher attitudes on…
Descriptors: Teacher Role, Teacher Attitudes, Digital Literacy, Citizenship
Yaprak Dalat Ward; James G. Ward; Li-Jen Lester – Information Systems Education Journal, 2024
This study investigated the digital existence of the food bank users in a university town in Texas, and subsequently, aligned with the research's pragmatic focus, the researchers designed a training model for these food bank users. Two research questions guided the study: What are the digital existence levels of the food bank users, and what…
Descriptors: Food, Hunger, Universities, Digital Literacy
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
James J. Meadows III – ProQuest LLC, 2023
The purpose of this exploratory qualitative study was to explore the impacts security training experts believe implementing a mandatory gamified security awareness training curriculum in public middle schools will have on the long-term security behavior of students in Texas. My study addressed whether security training for teenagers will solve the…
Descriptors: Middle School Students, Public Schools, Gamification, Educational Games
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Office of Educational Technology, US Department of Education, 2023
This is the second in a series of five briefs published by the U.S. Department of Education Office of Educational Technology on the key considerations facing educational leaders as they work to build and sustain core digital infrastructure for learning. These briefs offer recommendations to complement the fundamental infrastructure considerations…
Descriptors: Elementary Secondary Education, Technology Uses in Education, Educational Technology, Rural Education
Mendoza-Diaz, Noemi; Mai, Bin; Martinez, Jessica; Jabarkhail, Sami; Garcia, Deyanira – Journal of Technology Education, 2020
This study compared students' expectations, perceptions, and grades in two undergraduate technology management courses at a university in the United States. One course was a technical course taught by a single instructor in an online course section and in a face-to-face section, and the second was a nontechnical course taught by a different…
Descriptors: Undergraduate Students, Student Attitudes, Grades (Scholastic), Online Courses
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Dotting i's and Crossing T's: Integrating Breadth and Depth in an Undergraduate Cybersecurity Course
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Maina, Faith; Smit, Julie; Serwadda, Abdul – Australian and International Journal of Rural Education, 2021
The research experience for teachers (RET) professional development was a six-week long summer-intensive National Science Foundation (NSF) funded project that took place at a large university in western Texas. It was designed to provide a research-rich learning environment in data science and cybersecurity for STEM teachers in the region, which is…
Descriptors: Faculty Development, Summer Programs, STEM Education, Rural Schools
Perry, Angela – Project on Student Debt, 2019
California has long been a national and global leader in developing and maintaining quality higher education options, as well as in providing financial aid and consumer protections for Californians who access that education. However, although California's colleges and the state government do collect, receive, and report a great deal of data, these…
Descriptors: Education Work Relationship, Access to Information, Wages, Data Collection
US Government Accountability Office, 2016
Enacted in 2014, the Workforce Innovation and Opportunity Act (WIOA) brought numerous changes to existing federal employment and training programs, including requiring the Department of Labor (DOL) and the Department of Education (Education) to implement a common performance accountability system across the six WIOA-designated core programs. WIOA…
Descriptors: Federal Legislation, Legislators, Accountability, Job Training
Previous Page | Next Page ยป
Pages: 1 | 2