You are here:

Three Reasons for Improving Cybersecurity Instruction and Practice in Schools

, Louisiana Tech University / University of North Texas, United States ; , Virginia Commonwealth University / University of North Texas, United States

Society for Information Technology & Teacher Education International Conference, in Washington, D.C., United States ISBN 978-1-939797-32-2 Publisher: Association for the Advancement of Computing in Education (AACE), Chesapeake, VA


Information security, or cybersecurity, has become a critical field for modern society. While they may not seem it, schools are a critical battleground for these cybersecurity issues. On the business side, schools maintain sensitive records about students and parents that would be a treasure trove for identity thieves. In their classrooms, high-speed Internet connections and the adoption of 1-to-1 computing and the Internet of Things make school networks an appealing target for hackers looking to build botnets. Meanwhile, the instruction provided is expected to prepare all students with the necessary skills to be productive in a cyber-centric society and encourage a few of them to become the cyber guardians of tomorrow. This paper is a thought-piece intended to raise educator awareness of cybersecurity issues by exploring the world of cybersecurity and providing three reasons why schools should take cybersecurity issues seriously in their administration and their classrooms.


Coleman, C.D. & Reeder, E. (2018). Three Reasons for Improving Cybersecurity Instruction and Practice in Schools. In E. Langran & J. Borup (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference (pp. 1020-1025). Washington, D.C., United States: Association for the Advancement of Computing in Education (AACE). Retrieved January 21, 2019 from .

View References & Citations Map


  1. Adler, M.J. (1982). The Paidea proposal: An educational manifesto. New York: Collier Macmillan.
  2. Barth, B. (2017, November 7). Hundreds of school websites redirected pro-ISIS webpage. SC Magazine. Retrieved from
  3. Bialaszewski, D. (2015). Information security in education: Are we continually improving? Issues in Informing Science and Information Technology, 12, 45-54. Retrieved from
  4. BitSight Technologies (2015). Third annual BitSight insights industry benchmark report. Retrieved from Buiocchi, T. (2007, December 5). Driving operational cost savings with the Internet of Things. MIT Sloan Management Review. Retrieved from
  5. Crosson-Tower, C. (2003). The role of educators in preventing and responding to child abuse and neglect. Retrieved from U.S. Department of Health and Human Services website:,January17).Retrievedfrom
  6. DeMarrais, K.B., & LeCompte, M.D. (1995). The way schools work: A sociological analysis of education (2nd ed.). White Plains, NY: Longman Publishers.
  7. Dewey, J. (1934). Individual psychology and education. The Philosopher. Retrieved from
  8. Evans, D. (2011). The Internet of Things: How the next evolution of the internet is changing everything. Retrieved from Gartner says 4.9 billion connected “things” will be in use in 2015. (2014, November 11). Retrieved from
  9. Hewlett Packard Enterprise. (2015) Internet of things research study. Retrieved from & Cc=us & Lc=en
  10. Kramer, F.D. (2009). Cyberpower and national security: Policy recommendations for a strategic framework. In F.D. Kramer, S.H. Starr, & L.K. Wentz (Eds.) Cyberpower and National Security. Retrieved from
  11. Martin, J.P. (2010, October 12). Lower Merion district’s laptop saga ends with $610,000 settlement. Philadelphia Inquirer. Retrieved from:
  12. McCrohan, K.F., Engel, K., & Harvey, J.W. (2010). Influence of awareness and training on cybersecurity. Journal of Internet Commerce, 9(1), 23–41.
  13. National CyberSecurity Alliance (2011). The state of K-12 cyberethics, cybersafety, and cybersecurity curriculum in the United States. Retrieved from:
  14. PricewaterhouseCoopers (2014). US cybercrime: Rising risks, reduced readiness. Retrieved from: Ribble, M. (2015). Digital citizenship in schools (3rd ed.) Washington, DC: International Society for Technology in Education.
  15. Rios, E. (2017, October 25). Hackers are stealing sensitive student data– And schools are paying thousands of dollars to get it back. Mother Jones. Retrieved from DASHDASH
  16. Rodrigue, T. (2017, October 16). ALERT! – CyberAdvisory – New Type of Cyber Extortion/Threat [Electronic mailing list message]. Retrieved from
  17. Spector, J.M. (2016). Ethics in educational technology: towards a framework for ethical decision making in and for the discipline. Educational Technology Research& Development, 64(1), 1003–1011.
  18. Tyack, D.B. (1988). Ways of seeing: An essay on the history of compulsory schooling. In R.M. Jaeger (Ed.), Complementary methods for research in education (pp. 24-59). Washington, DC: American
  19. Younes, W. (2013). Cybersecurity education (training and awareness) for K-12 faculty and staff in Allegheny county (Order No. 3577772). Available from ProQuest Dissertations& Theses Global. (1490983194). Retrieved from

These references have been extracted automatically and may have some errors. If you see a mistake in the references above, please contact