Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Curriculum | 7 |
Information Security | 7 |
Competition | 2 |
Computer Science Education | 2 |
Internship Programs | 2 |
Learning Activities | 2 |
Agriculture | 1 |
Best Practices | 1 |
Biological Influences | 1 |
Biological Sciences | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 4 |
Industry and Higher Education | 1 |
Journal of Education for… | 1 |
ProQuest LLC | 1 |
Author
Alhamdani, Wasim A. | 1 |
Anne M. Brown | 1 |
Bowen, Debra | 1 |
Childs, Dawn | 1 |
Donna Westfall-Rudd | 1 |
Jaurez, James | 1 |
Jones, Nancy | 1 |
Joseph Oakes | 1 |
Joseph Simpson | 1 |
Kellie Johnson | 1 |
Payne, Dinah M. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 4 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Postsecondary Education | 4 |
Higher Education | 3 |
Elementary Secondary Education | 1 |
Audience
Location
Canada | 1 |
Maine | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Childs, Dawn – ProQuest LLC, 2023
Cyberattacks in the United States have consistently increased over recent years, and there is no apparent end to this upward trend. The increase in these attacks has resulted in successful cyber incidents and breaches of large, small, and medium-sized organizations across varied locales and industries. The hospitality industry has not been immune…
Descriptors: Hospitality Occupations, Professional Education, Curriculum, Computer Security
Bowen, Debra; Jaurez, James; Jones, Nancy; Reid, William; Simpson, Christopher – Journal of Cybersecurity Education, Research and Practice, 2022
There are many resources to guide successful K-12 cybersecurity education. The objective of these resources is to prepare skilled and ethical cybersecurity students at the earliest level to meet the demands of higher-level programs. The goal of this article is to provide, as a starting point, a list of as many currently popular K-12 educational…
Descriptors: Computer Security, Information Security, Educational Resources, Elementary Secondary Education
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Kellie Johnson; Tiffany Drape; Joseph Oakes; Joseph Simpson; Anne M. Brown; Donna Westfall-Rudd – Journal of Cybersecurity Education, Research and Practice, 2024
Cyberbiosecurity and workforce development in agriculture and the life sciences (ALS) is a growing area of need in the curriculum in higher education. Students that pursue majors related to ALS often do not include training in cyber-related concepts or expose the 'hidden curriculum' of seeking internships and jobs. Exposing students through…
Descriptors: Agriculture, Biological Sciences, Curriculum, Biological Influences
Alhamdani, Wasim A. – Journal of Cybersecurity Education, Research and Practice, 2019
A suggested curriculum for secondary and primarily academic discipline in Cybersecurity Postsecondary Education is presented. This curriculum is developed based on the Association for Computing Machinery guidelines and the National Centers of Academic Excellence Cyber Operations program.
Descriptors: Postsecondary Education, Computer Security, Information Security, Computer Science Education
Wu, Yejun – Journal of Education for Library and Information Science, 2013
This paper addresses the curriculum overlap and gap between LIS education and intelligence education by analyzing the content of the websites of the intelligence education programs and courses in 27 representative intelligence education universities in the United States, and the intelligence-related programs and courses in the 56 LIS programs in…
Descriptors: Library Science, Library Education, Web Sites, Computer Literacy