NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 25 results Save | Export
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Juan Jaime Saldana II – ProQuest LLC, 2023
There is an ever-pressing need for cybersecurity awareness and implementation of learning strategies in the workplace to mitigate the increased threat posed by cyber-attacks and exacerbated by an untrained workforce. The lack of cybersecurity knowledge amongst government employees has increased to critical levels due to the amount of sensitive…
Descriptors: Information Security, Computer Security, Local Government, Government Employees
State Educational Technology Directors Association, 2022
Many districts struggle to access the cybersecurity expertise or other resources needed to secure their networks and data appropriately. This isn't because mitigation strategies don't exist. Often, the barrage of suggestions and warnings directed at school IT leaders are too overwhelming to navigate, are not properly scoped for educational…
Descriptors: Computer Security, Information Security, Privacy, Elementary Secondary Education
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Peter Draus; Sushma Mishra; Kevin Slonka; Natalya Bromall – Information Systems Education Journal, 2024
There is a significant skill gap, with millions of cybersecurity jobs still needing to be fulfilled due to a lack of a trained workforce. Various academic programs are available that teach students in different aspects of cybersecurity. This paper investigates if the title of an IT program has any impact on the desirability of a program and if…
Descriptors: College Students, Information Technology, Information Security, Cybernetics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Shehroze Farooqi – ProQuest LLC, 2021
Popular platforms such as Facebook and Twitter integrate third-party apps from developers to enhance the experience of their users. While third-party apps are widely used to provide legitimate functionality, the abuse of third-party apps by attackers is also becoming prevalent. Attackers are abusing third-party apps to orchestrate their malicious…
Descriptors: Social Media, Computer Security, Crime Prevention, Information Security
Matt Paulson – ProQuest LLC, 2021
With the recent proliferation of information technology, almost all users of technology, no matter the field, profession, or status, have experienced a commensurate increase in information security threats. This, in turn, creates a significant concern in higher institutions of public learning. Information Security Officers in public higher…
Descriptors: Higher Education, Information Security, Computer Security, Information Policy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kirk, Sarah; Foreman, Daniel; Lee, Cody; Beasley, Shannon W. – Journal of Cybersecurity Education, Research and Practice, 2019
The goal of this research is to describe an active learning opportunity that was conducted as a community service offering through our Center for Cybersecurity Education and Applied Research (CCEAR). As a secondary goal, the participants sought to gain real world experience by applying techniques and concepts studied in security classes. A local…
Descriptors: Active Learning, Computer Security, Information Security, Access to Information
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Richardson, Michael D.; Lemoine, Pamela A.; Stephens, Walter E.; Waller, Robert E. – Educational Planning, 2020
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st century. Computer security is an essential instrument for protecting children, but K-12 schools are considered one of the most attractive targets for data privacy crimes often due to the less-than-effective cybersecurity practices in schools. The human…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Privacy
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Rogers, Gary; Ashford, Tina – Association Supporting Computer Users in Education, 2015
In this presentation we will discuss the many and varied cyber attacks that have recently occurred in the higher ed community. We will discuss the perpetrators, the victims, the impact and how these institutions have evolved to meet this threat. Mitigation techniques and defense strategies will be covered as will a discussion of effective security…
Descriptors: Computer Security, Crime, Victims, Higher Education
Previous Page | Next Page ยป
Pages: 1  |  2