Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts

With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practic...

Full description

Saved in:
Bibliographic Details
Main Authors: Florence Martin, Julie Bacak, Erik Jon Byker, Weichao Wang, Jonathan Wagner, Lynn Ahlgrim-Delzell
Format: Article
Language:English
Published: Kennesaw State University 2023-07-01
Series:Journal of Cybersecurity Education, Research & Practice
Online Access:https://digitalcommons.kennesaw.edu/jcerp/vol2023/iss1/8/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849710270529667072
author Florence Martin
Julie Bacak
Erik Jon Byker
Weichao Wang
Jonathan Wagner
Lynn Ahlgrim-Delzell
author_facet Florence Martin
Julie Bacak
Erik Jon Byker
Weichao Wang
Jonathan Wagner
Lynn Ahlgrim-Delzell
author_sort Florence Martin
collection DOAJ
description With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of technology leaders in K-12 settings. Data collected from 23 district websites and from interviews with 12 district technology leaders were analyzed. Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link. Top challenges included keeping users informed, lack of buy-in from staff and decision-makers, lack of expertise to implement modern best practices, and cost of resources. Top concerns included possible cyberattacks, leaked student data, and lack of user awareness. Finally, their wish list included technology personnel, access to Clever of Class Link, external system diagnostic checks, professional development for staff, and replacing aging infrastructure. The findings have implications for K-12 administrators, technology leaders, and teachers.
format Article
id doaj-art-32a0ae44cc274bdeb86f0aea39db5652
institution DOAJ
issn 2472-2707
language English
publishDate 2023-07-01
publisher Kennesaw State University
record_format Article
series Journal of Cybersecurity Education, Research & Practice
spelling doaj-art-32a0ae44cc274bdeb86f0aea39db56522025-08-20T03:14:58ZengKennesaw State UniversityJournal of Cybersecurity Education, Research & Practice2472-27072023-07-0120231Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School DistrictsFlorence Martin0Julie Bacak1Erik Jon Byker2Weichao Wang3Jonathan Wagner4Lynn Ahlgrim-Delzell5North Carolina State UniversityUniversity of North Carolina CharlotteUniversity of North Carolina at CharlotteUniversity of North Carolina CharlotteUniversity of North Carolina CharlotteUniversity of North Carolina CharlotteWith the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of technology leaders in K-12 settings. Data collected from 23 district websites and from interviews with 12 district technology leaders were analyzed. Top security practices included cloud-based technologies, segregated network/V-LAN, two-factor authentication, limiting access, and use of Clever or Class Link. Top challenges included keeping users informed, lack of buy-in from staff and decision-makers, lack of expertise to implement modern best practices, and cost of resources. Top concerns included possible cyberattacks, leaked student data, and lack of user awareness. Finally, their wish list included technology personnel, access to Clever of Class Link, external system diagnostic checks, professional development for staff, and replacing aging infrastructure. The findings have implications for K-12 administrators, technology leaders, and teachers.https://digitalcommons.kennesaw.edu/jcerp/vol2023/iss1/8/
spellingShingle Florence Martin
Julie Bacak
Erik Jon Byker
Weichao Wang
Jonathan Wagner
Lynn Ahlgrim-Delzell
Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts
Journal of Cybersecurity Education, Research & Practice
title Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts
title_full Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts
title_fullStr Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts
title_full_unstemmed Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts
title_short Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts
title_sort examination of cybersecurity technologies practices challenges and wish list in k 12 school districts
url https://digitalcommons.kennesaw.edu/jcerp/vol2023/iss1/8/
work_keys_str_mv AT florencemartin examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts
AT juliebacak examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts
AT erikjonbyker examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts
AT weichaowang examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts
AT jonathanwagner examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts
AT lynnahlgrimdelzell examinationofcybersecuritytechnologiespracticeschallengesandwishlistink12schooldistricts