Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 4 |
| Since 2007 (last 20 years) | 9 |
Descriptor
| Community Colleges | 20 |
| Computer Security | 20 |
| Crime | 8 |
| Information Technology | 8 |
| Internet | 8 |
| Two Year Colleges | 8 |
| Information Security | 5 |
| National Security | 5 |
| Safety | 5 |
| Terrorism | 5 |
| Crime Prevention | 4 |
| More ▼ | |
Source
Author
| Council, Chip | 2 |
| Belshaw, Scott H. | 1 |
| Blezard, Rob | 1 |
| Brobst, Jan | 1 |
| Campbell, Robert D. | 1 |
| Colaiuta, Alexandrea | 1 |
| Ennis-Cole, Demetria | 1 |
| Finkel, Ed | 1 |
| Gamble, Cheryl | 1 |
| Hawthorne, Elizabeth K. | 1 |
| Hovis, R. Corby | 1 |
| More ▼ | |
Publication Type
| Reports - Descriptive | 20 |
| Journal Articles | 17 |
| Collected Works - Proceedings | 1 |
Education Level
| Two Year Colleges | 12 |
| Higher Education | 7 |
| Postsecondary Education | 6 |
Audience
| Administrators | 1 |
| Media Staff | 1 |
Location
| Texas | 3 |
| Connecticut | 2 |
| Kentucky | 2 |
| New Mexico | 2 |
| North Carolina | 2 |
| Alabama | 1 |
| District of Columbia | 1 |
| Florida | 1 |
| Iowa | 1 |
| Louisiana | 1 |
| Maryland | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Parry, Marc – Chronicle of Higher Education, 2009
If you work at a community college that teaches cybersecurity, it pays to be located in the backyard of a spy agency. Just don't ask Kelly A. Koermer, administrator of the Anne Arundel Community College, what's inside those dark towers at Fort Meade. She points out other highlights of the restricted region: an employees-only exit off the highway,…
Descriptors: Community Colleges, Internet, Computer Security, National Security
Shelton, Kay – Community & Junior College Libraries, 2009
The media often report on the negativity of Facebook, with horror stories of people losing their jobs because of something they posted. There can be useful purposes for Facebook, however, especially after the unthinkable happens on a college campus. Community college libraries can incorporate Facebook into their security planning.
Descriptors: Community Colleges, College Libraries, Social Networks, Computer Mediated Communication
Brobst, Jan; Council, Chip – Community College Journal, 2005
The discussion in this article is intended to provide an examination of why top management, IT management, and internal auditors should be interested in IT governance. Some aspects of IT management will be described including implementation, auditing, availability, security, and alignment. One governance framework, COBIT, will be utilized as a…
Descriptors: Audits (Verification), Information Technology, Administration, Governance
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Campbell, Robert D.; Hawthorne, Elizabeth K. – 2002
This document describes four distinct approaches to education in the area of cybersecurity currently taught at community colleges across America. The four broad categories of instruction are: (1) degree program--four semesters of study leading to an associate's degree; (2) certificate program--two semesters leading to an institution-conferred…
Descriptors: College Programs, Community Colleges, Computer Security, Educational Innovation
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Martin, James; Samels, James E. – Chronicle of Higher Education, 2007
College and university presidents are increasingly called upon to make informed choices about technology. The rapidly shifting landscape makes it tough to keep up with change and innovation, let alone stay ahead of the curve. In this article, the authors discuss 10 trends to watch in campus technology. These trends are the following: (1) increased…
Descriptors: Educational Trends, Information Technology, Partnerships in Education, Proprietary Schools
Teles, Elizabeth J.; Hovis, R. Corby – Community College Journal, 2002
Describes recent federal legislation (H.R. 3394) that charges the National Science Foundation with offering more grants to colleges and universities for degree programs in computer and network security, and to establish trainee programs for graduate students who pursue doctoral degrees in computer and network security. Discusses aspects of…
Descriptors: College Role, Community Colleges, Computer Security, Crime
Johnson, Elaine A. – Community College Journal, 2002
Describes Bio-Link, the Advanced Technological Education (ATE) Center for Biotechnology established with funding from the National Science Foundation (NSF). Reports that Bio-Link, headquartered at City College of San Francisco, has created a national network and resource base for community colleges, industry, and others interested in biotechnology…
Descriptors: Biology, Biotechnology, Community Colleges, Computer Security
Schmidt, Howard – Community College Journal, 2002
Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…
Descriptors: Community Colleges, Computer Security, Crime, Emergency Programs
Previous Page | Next Page »
Pages: 1 | 2
Direct link
Peer reviewed
