NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 31 to 45 of 92 results Save | Export
Curtis, Scipiaruth Kendall – ProQuest LLC, 2012
The continual emergence of technologies has infiltrated government and industry business infrastructures, requiring reforming organizations and fragile network infrastructures. Emerging technologies necessitates countermeasures, commitment to cybersecurity and information technology governance for organization's survivability and sustainability.…
Descriptors: Computer Security, Information Technology, Governance, Case Studies
Choi, Min Suk – ProQuest LLC, 2013
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common…
Descriptors: Public Agencies, Computer Security, Self Efficacy, Computer Use
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Wang, Shuangbao; Kelly, William – Journal of Learning Analytics, 2017
In this paper, we present a novel system, inVideo, for video data analytics, and its use in transforming linear videos into interactive learning objects. InVideo is able to analyze video content automatically without the need for initial viewing by a human. Using a highly efficient video indexing engine we developed, the system is able to analyze…
Descriptors: Video Technology, Online Courses, Educational Technology, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Troyan, Danielle – Industry and Higher Education, 2015
BHEF has achieved particular success in operationalizing its National Higher Education and Workforce Initiative (HEWI) in Maryland focusing on cybersecurity. Leveraging its membership of corporate CEOs, university presidents and government agency leaders, BHEF partnered with the University System of Maryland to build a system-wide response to the…
Descriptors: Higher Education, Labor Force Development, Internet, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Davidson, Mary Ann – EDUCAUSE Review, 2005
Leadership in IT security is needed. Security matters: the ethics, the economics, and the social implications. There is much the academic community can do to help ensure cybersecurity. This document discusses steps academia can take to help ensure cybersecurity.
Descriptors: Internet, Computer Security, Ethics, Social Issues
Barkanic, Stephen – Business-Higher Education Forum, 2016
The United States faces a pressing national security and competitiveness challenge rooted in a shortage of a diverse, highly skilled workforce, particularly in vital cross-disciplinary fields such as data science and analytics, cybersecurity, and information technology. To address this challenge, Business-Higher Education Forum (BHEF) launched the…
Descriptors: Alignment (Education), Postsecondary Education, Labor Needs, Strategic Planning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Serapiglia, Anthony – Information Systems Education Journal, 2016
Through industry news as well as contemporary reporting, the topic of computer security has become omnipresent in our daily lives. Whether the news is about corporate data breaches, international cyber espionage, or personal data compromises and identity theft--EVERYONE has had to deal with digital security in some way. Because of this, one of the…
Descriptors: Competition, Undergraduate Students, Computer Security, Information Security
Swanson, Dewey; Gusev, Dmitri A. – Association Supporting Computer Users in Education, 2016
Purdue Polytechnic has several locations in the state of Indiana offering students a chance to get a Purdue degree. The Computer and Information Technology (CIT) department offers the CIT degree at three sites in Indiana: Anderson, Columbus and Kokomo. CIT offers several potential majors including Cybersecurity, Network Engineering, Systems…
Descriptors: Computer Science Education, Postsecondary Education, Higher Education, Networks
Giacobe, Nicklaus A. – ProQuest LLC, 2013
Cyber-security involves the monitoring a complex network of inter-related computers to prevent, identify and remediate from undesired actions. This work is performed in organizations by human analysts. These analysts monitor cyber-security sensors to develop and maintain situation awareness (SA) of both normal and abnormal activities that occur on…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Risk Management
Peer reviewed Peer reviewed
Direct linkDirect link
Martin, Florence; Wang, Chuang; Petty, Teresa; Wang, Weichao; Wilkins, Patti – Educational Technology & Society, 2018
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and "bring your own technology" initiatives, attention to these topics is becoming increasingly important. A total of 593…
Descriptors: Middle School Students, Social Media, Student Surveys, Bullying
Morrison, Ira L. – New England Journal of Higher Education, 2017
This article describes the expansion of the main campus of the Sacred Heart University (SHU) (Connecticut), with the recent purchase of 66-acres of space (former G.E. headquarters site). SHU named this new space their West Campus and it will used to house their School of Computing, (computer engineering, computer gaming and cybersecurity) and new…
Descriptors: Multicampus Colleges, School Expansion, Church Related Colleges, Catholic Schools
Minotra, Dev – ProQuest LLC, 2012
With increased volume and sophistication of cyber attacks in recent years, maintaining situation awareness and effective task-prioritization strategy is critical to the task of cybersecurity analysts. However, high levels of mental-workload associated with the task of cybersecurity analyst's limits their ability to prioritize tasks.…
Descriptors: Task Analysis, Computer Security, Human Factors Engineering, Attention
Stuart, Reginald – Diverse: Issues in Higher Education, 2012
When academic leaders across the nation talk informally about institutions noted for innovative academic programs and securing choice internships and jobs for students and faculty, Fayetteville State University (FSU) in North Carolina isn't on the radar. With a new, evolving focus on cybersecurity and disaster management, FSU, a historically Black…
Descriptors: Black Colleges, National Security, Academic Achievement, Internship Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Fitzgerald, Brian K.; Barkanic, Steve; Cardenas-Navia, Isabel; Elzey, Karen; Hughes, Debbie; Kashiri, Erica; Troyan, Danielle – Industry and Higher Education, 2014
Partnerships between higher education and business have long been an important part of the academic landscape, but often they are based on shorter-term transactional objectives rather than on longer-term strategic goals. BHEF's National Higher Education and Workforce Initiative brings together business and academia at the institutional,…
Descriptors: School Business Relationship, Partnerships in Education, Computer Security, STEM Education
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7