Main Nav

Search results

Showing 41 - 50 of 1635 Results

Sort by:

Pedagogy, Technology, and the Example of Open Educational Resources
November 9, 2015

When no meaningful relationship exists between an educational technology and pedagogy, the tool itself loses value. Open educational resources provide a relevant example of how pedagogy can point…

What We Can Learn from Jon Stewart about Talent Development
October 16, 2015

We all have opportunities in our careers to become, like Jon Stewart, a “superboss.” We all have opportunities in our careers to become, like…

How to Avoid Unintentional Insider Threats
October 30, 2015

People within an organization pose unintentional threats, although lost devices have become a major concern. Training and awareness offer the best protection against losses. …

VA SCAN: Recognizing Advancement of the Security Profession
October 29, 2015

VA SCAN offers an excellent example of a community trying to build an up-and-coming generation of well-networked and well-educated information security professionals. …

Cybersecurity Risk Management
October 29, 2015

The NIST Cybersecurity Framework enables a way to effect consistent prioritization, execution, and measurement of activity to achieve cybersecurity risk-management goals, tailored to each institu…

Building the Next Generation of Cyber Professionals, One at a Time
October 28, 2015

Student workers bring IT the benefit of having bright young minds embedded in the security organization, and they get a friendly and supportive atmosphere to develop good work habits and learn ab…

Hacking the Gaming Experience: The (Non-Virtual) Reality of Cybersecurity Video Gamification
October 27, 2015

Players love games because they are effective, memorable, and fun; as a result, games may be the perfect mechanism for teaching any generation both cybersecurity concepts and cybersecurity skills…

We All Need to Be in the Cybersecurity In-Group
October 27, 2015

Not even the best university IT security team can take on cybercrime alone. The team needs partners throughout the university, including IT professionals, faculty, staff, students, and — well, …

Securing the Human with Limited Time and Resources
October 26, 2015

Did you know that over 70 percent of security awareness officers spend less than 25 percent of their time on security awareness (figure 1)? 1 That means the vast majority of us run an awarenes…

Next Generation K-12: 10 Implications for HigherEd
October 29, 2015

There are a growing number of next generation models in K-12 as a result of new thinking about learning design and deeper understandings of college and career readiness, enabled by cheap devices,…