
Three Reasons for Improving Cybersecurity Instruction and Practice in Schools
PROCEEDING
Christopher D. Coleman, Louisiana Tech University / University of North Texas, United States ; Elaine Reeder, Virginia Commonwealth University / University of North Texas, United States
Society for Information Technology & Teacher Education International Conference, in Washington, D.C., United States ISBN 978-1-939797-32-2 Publisher: Association for the Advancement of Computing in Education (AACE), Waynesville, NC USA
Abstract
Information security, or cybersecurity, has become a critical field for modern society. While they may not seem it, schools are a critical battleground for these cybersecurity issues. On the business side, schools maintain sensitive records about students and parents that would be a treasure trove for identity thieves. In their classrooms, high-speed Internet connections and the adoption of 1-to-1 computing and the Internet of Things make school networks an appealing target for hackers looking to build botnets. Meanwhile, the instruction provided is expected to prepare all students with the necessary skills to be productive in a cyber-centric society and encourage a few of them to become the cyber guardians of tomorrow. This paper is a thought-piece intended to raise educator awareness of cybersecurity issues by exploring the world of cybersecurity and providing three reasons why schools should take cybersecurity issues seriously in their administration and their classrooms.
Citation
Coleman, C.D. & Reeder, E. (2018). Three Reasons for Improving Cybersecurity Instruction and Practice in Schools. In E. Langran & J. Borup (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference (pp. 1020-1025). Washington, D.C., United States: Association for the Advancement of Computing in Education (AACE). Retrieved December 10, 2023 from https://www.learntechlib.org/primary/p/182648/.
© 2018 Association for the Advancement of Computing in Education (AACE)
References
View References & Citations Map- Adler, M.J. (1982). The Paidea proposal: An educational manifesto. New York: Collier Macmillan.
- Barth, B. (2017, November 7). Hundreds of school websites redirected pro-ISIS webpage. SC Magazine. Retrieved from https://www.scmagazine.com/hundreds-of-school-websites-redirected-pro-isis-webpage/article/705985/
- Bialaszewski, D. (2015). Information security in education: Are we continually improving? Issues in Informing Science and Information Technology, 12, 45-54. Retrieved from http://iisit.org/Vol12/IISITv12p045054Bialaszewski1770.pdf
- BitSight Technologies (2015). Third annual BitSight insights industry benchmark report. Retrieved from http://cdn2.hubspot.net/hubfs/277648/Insights/Q315_BitSight_Insights_Energy_Utilities.pdf Buiocchi, T. (2007, December 5). Driving operational cost savings with the Internet of Things. MIT Sloan Management Review. Retrieved from https://sloanreview.mit.edu/article/driving-operational-cost-savingswith-the-internet-of-things/
- Crosson-Tower, C. (2003). The role of educators in preventing and responding to child abuse and neglect. Retrieved from U.S. Department of Health and Human Services website: https://www.childwelfare.gov/pubPDFs/educator.pdfCyberattacktracedtohackedrefrigerator.(2014,January17).Retrievedfromhttp://phys.org/news/2014-01cyberattack-hacked-refrigerator.html
- DeMarrais, K.B., & LeCompte, M.D. (1995). The way schools work: A sociological analysis of education (2nd ed.). White Plains, NY: Longman Publishers.
- Dewey, J. (1934). Individual psychology and education. The Philosopher. Retrieved from http://www.thephilosopher.co.uk/2016/08/individual-psychology-and-education-1934.html
- Evans, D. (2011). The Internet of Things: How the next evolution of the internet is changing everything. Retrieved from http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf Gartner says 4.9 billion connected “things” will be in use in 2015. (2014, November 11). Retrieved from http://www.gartner.com/newsroom/id/2905717
- Hewlett Packard Enterprise. (2015) Internet of things research study. Retrieved from http://h20195.www2.hp.com/V2/GetDocument.aspx?docname=4AA5-4759ENW & Cc=us & Lc=en
- Kramer, F.D. (2009). Cyberpower and national security: Policy recommendations for a strategic framework. In F.D. Kramer, S.H. Starr, & L.K. Wentz (Eds.) Cyberpower and National Security. Retrieved from http://ndupress.ndu.edu/Portals/68/Documents/Books/CTBSP-Exports/Cyberpower/Cyberpower-I-Chap01.pdf
- Martin, J.P. (2010, October 12). Lower Merion district’s laptop saga ends with $610,000 settlement. Philadelphia Inquirer. Retrieved from: http://articles.philly.com/2010-10-12/news/24981536_1_laptop-students-districtseveral-million-dollars
- McCrohan, K.F., Engel, K., & Harvey, J.W. (2010). Influence of awareness and training on cybersecurity. Journal of Internet Commerce, 9(1), 23–41.
- National CyberSecurity Alliance (2011). The state of K-12 cyberethics, cybersafety, and cybersecurity curriculum in the United States. Retrieved from: http://www.staysafeonline.org/download/datasets/2052/2011_national_k12_study.pdf
- PricewaterhouseCoopers (2014). US cybercrime: Rising risks, reduced readiness. Retrieved from: https://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf Ribble, M. (2015). Digital citizenship in schools (3rd ed.) Washington, DC: International Society for Technology in Education.
- Rios, E. (2017, October 25). Hackers are stealing sensitive student data– And schools are paying thousands of dollars to get it back. Mother Jones. Retrieved from http://www.motherjones.com/crimejustice/2017/10/hackers-are-stealing-sensitive-student-data-and-schools-are-paying-thousands-of-dollars DASHDASH
- Rodrigue, T. (2017, October 16). ALERT! – CyberAdvisory – New Type of Cyber Extortion/Threat [Electronic mailing list message]. Retrieved from https://ifap.ed.gov/eannouncements/101617ALERTCyberAdvisoryNewTypeCyberExtortionThreat.html
- Spector, J.M. (2016). Ethics in educational technology: towards a framework for ethical decision making in and for the discipline. Educational Technology Research& Development, 64(1), 1003–1011.
- Tyack, D.B. (1988). Ways of seeing: An essay on the history of compulsory schooling. In R.M. Jaeger (Ed.), Complementary methods for research in education (pp. 24-59). Washington, DC: American
- Younes, W. (2013). Cybersecurity education (training and awareness) for K-12 faculty and staff in Allegheny county (Order No. 3577772). Available from ProQuest Dissertations& Theses Global. (1490983194). Retrieved from http://search.proquest.com/docview/1490983194?accountid=7113
These references have been extracted automatically and may have some errors. Signed in users can suggest corrections to these mistakes.
Suggest Corrections to References