Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practic...
Saved in:
| Main Authors: | , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Kennesaw State University
2023-07-01
|
| Series: | Journal of Cybersecurity Education, Research & Practice |
| Online Access: | https://digitalcommons.kennesaw.edu/jcerp/vol2023/iss1/8/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849710270529667072 |
|---|---|
| author | Florence Martin Julie Bacak Erik Jon Byker Weichao Wang Jonathan Wagner Lynn Ahlgrim-Delzell |
| author_facet | Florence Martin Julie Bacak Erik Jon Byker Weichao Wang Jonathan Wagner Lynn Ahlgrim-Delzell |
| author_sort | Florence Martin |
| collection | DOAJ |
| description | With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of technology leaders in K-12 settings. Data collected from 23 district websites and from interviews with 12 district technology leaders were analyzed. Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link. Top challenges included keeping users informed, lack of buy-in from staff and decision-makers, lack of expertise to implement modern best practices, and cost of resources. Top concerns included possible cyberattacks, leaked student data, and lack of user awareness. Finally, their wish list included technology personnel, access to Clever of Class Link, external system diagnostic checks, professional development for staff, and replacing aging infrastructure. The findings have implications for K-12 administrators, technology leaders, and teachers. |
| format | Article |
| id | doaj-art-32a0ae44cc274bdeb86f0aea39db5652 |
| institution | DOAJ |
| issn | 2472-2707 |
| language | English |
| publishDate | 2023-07-01 |
| publisher | Kennesaw State University |
| record_format | Article |
| series | Journal of Cybersecurity Education, Research & Practice |
| spelling | doaj-art-32a0ae44cc274bdeb86f0aea39db56522025-08-20T03:14:58ZengKennesaw State UniversityJournal of Cybersecurity Education, Research & Practice2472-27072023-07-0120231Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School DistrictsFlorence Martin0Julie Bacak1Erik Jon Byker2Weichao Wang3Jonathan Wagner4Lynn Ahlgrim-Delzell5North Carolina State UniversityUniversity of North Carolina CharlotteUniversity of North Carolina at CharlotteUniversity of North Carolina CharlotteUniversity of North Carolina CharlotteUniversity of North Carolina CharlotteWith the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of technology leaders in K-12 settings. Data collected from 23 district websites and from interviews with 12 district technology leaders were analyzed. Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link. Top challenges included keeping users informed, lack of buy-in from staff and decision-makers, lack of expertise to implement modern best practices, and cost of resources. Top concerns included possible cyberattacks, leaked student data, and lack of user awareness. Finally, their wish list included technology personnel, access to Clever of Class Link, external system diagnostic checks, professional development for staff, and replacing aging infrastructure. The findings have implications for K-12 administrators, technology leaders, and teachers.https://digitalcommons.kennesaw.edu/jcerp/vol2023/iss1/8/ |
| spellingShingle | Florence Martin Julie Bacak Erik Jon Byker Weichao Wang Jonathan Wagner Lynn Ahlgrim-Delzell Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts Journal of Cybersecurity Education, Research & Practice |
| title | Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts |
| title_full | Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts |
| title_fullStr | Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts |
| title_full_unstemmed | Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts |
| title_short | Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts |
| title_sort | examination of cybersecurity technologies practices challenges and wish list in k 12 school districts |
| url | https://digitalcommons.kennesaw.edu/jcerp/vol2023/iss1/8/ |
| work_keys_str_mv | AT florencemartin examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts AT juliebacak examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts AT erikjonbyker examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts AT weichaowang examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts AT jonathanwagner examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts AT lynnahlgrimdelzell examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts |