NotesFAQContact Us
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 15 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Parekh, Geet; DeLatte, David; Herman, Geoffrey L.; Oliva, Linda; Phatak, Dhananjay; Scheponik, Travis; Sherman, Alan T. – IEEE Transactions on Education, 2018
This paper presents and analyzes results of two Delphi processes that polled cybersecurity experts to rate cybersecurity topics based on importance, difficulty, and timelessness. These ratings can be used to identify core concepts--cross-cutting ideas that connect knowledge in the discipline. The first Delphi process identified core concepts that…
Descriptors: Delphi Technique, Specialists, Fundamental Concepts, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Knapp, Kenneth J.; Maurer, Christopher; Plachkinova, Miloslava – Journal of Information Systems Education, 2017
Much has been published about developing a cybersecurity curriculum for institutes of higher learning (IHL). Now that a growing number of IHLs globally offer such programs, a need exists on how to guide, maintain, and improve the relevancy of existing curricula. Just as cybersecurity professionals must be hone their skills continually to keep with…
Descriptors: Information Security, Computer Security, Computer Science Education, Certification
Business-Higher Education Forum, 2017
"Invest to Improve: The Cybersecurity Talent Deficit" provides recommendations for cybersecurity stakeholders--employers, government agencies, and higher education institutions--to enable regional partnerships to meet today's cybersecurity skills needs. This report combines data from a 2017 Gallup survey of business executives and higher…
Descriptors: Information Security, Talent, Information Systems, College Students
Peer reviewed Peer reviewed
Direct linkDirect link
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Troyan, Danielle – Industry and Higher Education, 2015
BHEF has achieved particular success in operationalizing its National Higher Education and Workforce Initiative (HEWI) in Maryland focusing on cybersecurity. Leveraging its membership of corporate CEOs, university presidents and government agency leaders, BHEF partnered with the University System of Maryland to build a system-wide response to the…
Descriptors: Higher Education, Labor Force Development, Internet, Computer Security
Swanson, Dewey; Gusev, Dmitri A. – Association Supporting Computer Users in Education, 2016
Purdue Polytechnic has several locations in the state of Indiana offering students a chance to get a Purdue degree. The Computer and Information Technology (CIT) department offers the CIT degree at three sites in Indiana: Anderson, Columbus and Kokomo. CIT offers several potential majors including Cybersecurity, Network Engineering, Systems…
Descriptors: Computer Science Education, Postsecondary Education, Higher Education, Networks
Stuart, Reginald – Diverse: Issues in Higher Education, 2012
When academic leaders across the nation talk informally about institutions noted for innovative academic programs and securing choice internships and jobs for students and faculty, Fayetteville State University (FSU) in North Carolina isn't on the radar. With a new, evolving focus on cybersecurity and disaster management, FSU, a historically Black…
Descriptors: Black Colleges, National Security, Academic Achievement, Internship Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Kashiri, Erica; Troyan, Danielle – Industry and Higher Education, 2014
Partnerships between higher education and business have long been an important part of the academic landscape, but often they are based on shorter-term transactional objectives rather than on longer-term strategic goals. BHEF's National Higher Education and Workforce Initiative brings together business and academia at the institutional,…
Descriptors: School Business Relationship, Partnerships in Education, Computer Security, STEM Education
Peer reviewed Peer reviewed
Direct linkDirect link
Cárdenas-Navia, Isabel; Fitzgerald, Brian K. – Change: The Magazine of Higher Learning, 2015
New technologies and data science are transforming a wide range of organizations into analytics-intensive enterprises. Despite the resulting demand for graduates with experience in the application of analytics, though, undergraduate education has been slow to change. The academic and policy communities have engaged in a decade-long conversation…
Descriptors: Statistics, Statistical Analysis, Liberal Arts, STEM Education
Blumenthal, Anita – Facilities Manager, 2013
"Higher education is at a crossroads," Kelly Baxley declared as he introduced the plenary session at the APPA 2013 conference in Minneapolis last August. "The sector urgently needs to innovate because becoming a savvy user of technology is now a requirement, regardless of industry or career path. The vast proliferation of mobile…
Descriptors: Higher Education, Trend Analysis, Educational Development, Influence of Technology
Business-Higher Education Forum, 2013
This is the first in a series of Business-Higher Education Forum (BHEF) playbooks intended to assist companies, higher education institutions, private philanthropies, membership associations, professional societies, government agencies, and other stakeholders seeking to understand the potential value of investing in coordinated strategic,…
Descriptors: Higher Education, Labor Force Development, Partnerships in Education, Academic Persistence
Peer reviewed Peer reviewed
Direct linkDirect link
Voss, Brian D.; Siegel, Peter M. – EDUCAUSE Review, 2009
Considering the unprecedented budget hardships in higher education, now may not seem to be an auspicious time to be emphasizing the importance of continuing, or even perhaps increasing, investments in information security. Decisions regarding these matters are usually in the hands of the CIOs, leaving information technology (IT) leaders in…
Descriptors: Higher Education, Economic Climate, Information Systems, Information Technology
US Department of Homeland Security, 2010
Critical infrastructure and key resources (CIKR) provide the essential services that support basic elements of American society. Compromise of these CIKR could disrupt key government and industry activities, facilities, and systems, producing cascading effects throughout the Nation's economy and society and profoundly affecting the national…
Descriptors: Higher Education, Research and Development, National Security, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Gonick, Lev S. – EDUCAUSE Review, 2006
In the first decades of the IT revolution, disproportionate amounts of intellectual energy and financial investment were expended in building out the technology foundations. As a result, campuses now rely heavily on technology and Web resources that, though radically altering the academic landscape, have remained centered on the build-out of core…
Descriptors: Information Technology, Higher Education, Educational Innovation, Educational Change
Peer reviewed Peer reviewed
Direct linkDirect link
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security