You are here:

Three Reasons for Improving Cybersecurity Instruction and Practice in Schools PROCEEDING

, Louisiana Tech University / University of North Texas, United States ; , Virginia Commonwealth University / University of North Texas, United States

Society for Information Technology & Teacher Education International Conference, in Washington, D.C., United States ISBN 978-1-939797-32-2 Publisher: Association for the Advancement of Computing in Education (AACE), Chesapeake, VA

Abstract

Information security, or cybersecurity, has become a critical field for modern society. While they may not seem it, schools are a critical battleground for these cybersecurity issues. On the business side, schools maintain sensitive records about students and parents that would be a treasure trove for identity thieves. In their classrooms, high-speed Internet connections and the adoption of 1-to-1 computing and the Internet of Things make school networks an appealing target for hackers looking to build botnets. Meanwhile, the instruction provided is expected to prepare all students with the necessary skills to be productive in a cyber-centric society and encourage a few of them to become the cyber guardians of tomorrow. This paper is a thought-piece intended to raise educator awareness of cybersecurity issues by exploring the world of cybersecurity and providing three reasons why schools should take cybersecurity issues seriously in their administration and their classrooms.

Citation

Coleman, C.D. & Reeder, E. (2018). Three Reasons for Improving Cybersecurity Instruction and Practice in Schools. In E. Langran & J. Borup (Eds.), Proceedings of Society for Information Technology & Teacher Education International Conference (pp. 1020-1025). Washington, D.C., United States: Association for the Advancement of Computing in Education (AACE). Retrieved August 19, 2018 from .

View References & Citations Map

References

  1. Adler, M.J. (1982). The Paidea proposal: An educational manifesto. New York: Collier Macmillan.
  2. Barth, B. (2017, November 7). Hundreds of school websites redirected pro-ISIS webpage. SC Magazine. Retrieved from https://www.scmagazine.com/hundreds-of-school-websites-redirected-pro-isis-webpage/article/705985/
  3. Bialaszewski, D. (2015). Information security in education: Are we continually improving? Issues in Informing Science and Information Technology, 12, 45-54. Retrieved from http://iisit.org/Vol12/IISITv12p045054Bialaszewski1770.pdf
  4. BitSight Technologies (2015). Third annual BitSight insights industry benchmark report. Retrieved from http://cdn2.hubspot.net/hubfs/277648/Insights/Q315_BitSight_Insights_Energy_Utilities.pdf Buiocchi, T. (2007, December 5). Driving operational cost savings with the Internet of Things. MIT Sloan Management Review. Retrieved from https://sloanreview.mit.edu/article/driving-operational-cost-savingswith-the-internet-of-things/
  5. Crosson-Tower, C. (2003). The role of educators in preventing and responding to child abuse and neglect. Retrieved from U.S. Department of Health and Human Services website: https://www.childwelfare.gov/pubPDFs/educator.pdfCyberattacktracedtohackedrefrigerator.(2014,January17).Retrievedfromhttp://phys.org/news/2014-01cyberattack-hacked-refrigerator.html
  6. DeMarrais, K.B., & LeCompte, M.D. (1995). The way schools work: A sociological analysis of education (2nd ed.). White Plains, NY: Longman Publishers.
  7. Dewey, J. (1934). Individual psychology and education. The Philosopher. Retrieved from http://www.thephilosopher.co.uk/2016/08/individual-psychology-and-education-1934.html
  8. Evans, D. (2011). The Internet of Things: How the next evolution of the internet is changing everything. Retrieved from http://www.cisco.com/web/about/ac79/docs/innov/IoT_IBSG_0411FINAL.pdf Gartner says 4.9 billion connected “things” will be in use in 2015. (2014, November 11). Retrieved from http://www.gartner.com/newsroom/id/2905717
  9. Hewlett Packard Enterprise. (2015) Internet of things research study. Retrieved from http://h20195.www2.hp.com/V2/GetDocument.aspx?docname=4AA5-4759ENW & Cc=us & Lc=en
  10. Kramer, F.D. (2009). Cyberpower and national security: Policy recommendations for a strategic framework. In F.D. Kramer, S.H. Starr, & L.K. Wentz (Eds.) Cyberpower and National Security. Retrieved from http://ndupress.ndu.edu/Portals/68/Documents/Books/CTBSP-Exports/Cyberpower/Cyberpower-I-Chap01.pdf
  11. Martin, J.P. (2010, October 12). Lower Merion district’s laptop saga ends with $610,000 settlement. Philadelphia Inquirer. Retrieved from: http://articles.philly.com/2010-10-12/news/24981536_1_laptop-students-districtseveral-million-dollars
  12. McCrohan, K.F., Engel, K., & Harvey, J.W. (2010). Influence of awareness and training on cybersecurity. Journal of Internet Commerce, 9(1), 23–41.
  13. National CyberSecurity Alliance (2011). The state of K-12 cyberethics, cybersafety, and cybersecurity curriculum in the United States. Retrieved from: http://www.staysafeonline.org/download/datasets/2052/2011_national_k12_study.pdf
  14. PricewaterhouseCoopers (2014). US cybercrime: Rising risks, reduced readiness. Retrieved from: https://www.pwc.com/us/en/increasing-it-effectiveness/publications/assets/2014-us-state-of-cybercrime.pdf Ribble, M. (2015). Digital citizenship in schools (3rd ed.) Washington, DC: International Society for Technology in Education.
  15. Rios, E. (2017, October 25). Hackers are stealing sensitive student data– And schools are paying thousands of dollars to get it back. Mother Jones. Retrieved from http://www.motherjones.com/crimejustice/2017/10/hackers-are-stealing-sensitive-student-data-and-schools-are-paying-thousands-of-dollars DASHDASH
  16. Rodrigue, T. (2017, October 16). ALERT! – CyberAdvisory – New Type of Cyber Extortion/Threat [Electronic mailing list message]. Retrieved from https://ifap.ed.gov/eannouncements/101617ALERTCyberAdvisoryNewTypeCyberExtortionThreat.html
  17. Spector, J.M. (2016). Ethics in educational technology: towards a framework for ethical decision making in and for the discipline. Educational Technology Research& Development, 64(1), 1003–1011.
  18. Tyack, D.B. (1988). Ways of seeing: An essay on the history of compulsory schooling. In R.M. Jaeger (Ed.), Complementary methods for research in education (pp. 24-59). Washington, DC: American
  19. Younes, W. (2013). Cybersecurity education (training and awareness) for K-12 faculty and staff in Allegheny county (Order No. 3577772). Available from ProQuest Dissertations& Theses Global. (1490983194). Retrieved from http://search.proquest.com/docview/1490983194?accountid=7113

These references have been extracted automatically and may have some errors. If you see a mistake in the references above, please contact info@learntechlib.org.