NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Does not meet standards1
Showing 1 to 15 of 17,065 results Save | Export
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Catal, Cagatay; Ozcan, Alper; Donmez, Emrah; Kasif, Ahmet – Education and Information Technologies, 2023
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an…
Descriptors: Computer Security, Information Security, College Programs, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Levis Omusugu Amuya; Peterson Mwai Kariuki – Journal of Higher Education Policy and Management, 2024
Academic institutions today are experiencing a legion of security risks that are increasingly impeding their mission of producing high-quality graduates, guarding reason and educational integrity, and ultimately advancing human civilisation. The Enterprise Security Risk Management (ESRM) model represents a potential solution to the dynamic threats…
Descriptors: Foreign Countries, Universities, Risk Management, Accreditation (Institutions)
Dayo Obadofin – ProQuest LLC, 2023
This study investigated the relationship between information security training and awareness and employees' compliance with information security policy in the U.S. retail industry. Using a quantitative non-experimental research design, this study examined and quantified the significance of the relationship between information security training and…
Descriptors: Employees, Retailing, Information Security, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Chen, Hao; Zhang, Yan; Zhang, Song; Lyu, Tu – Education and Information Technologies, 2023
This study examines the effect of a gamified information security education system (ISES) on developing users' information security awareness and protection behavioral intention. We developed a research model based on affordance theory and means-end chain theory. Using a scenario-based experimental survey approach, we obtained 220 valid samples…
Descriptors: Intention, Information Security, Computer Security, Correlation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Prasetyo, Kuncoro Arry; Ansori; Suseto, Buddy – Online Submission, 2023
To establish good maritime governance, the Indonesian government must pay attention to maritime security aspects in every maritime policy and integrate maritime security education into the national education curriculum. However, implementing the World Maritime Axis concept, the Indonesian government still needs to consider the maritime security…
Descriptors: Foreign Countries, Marine Education, National Security, National Curriculum
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Fanfan; Cao, Ethan; Ma, Minjie – International Journal of Early Childhood, 2023
While many factors can influence children's sense of security, little research has examined the role of empathy ability in the association between parenting style and sense of security. The present study aims to examine whether empathy ability mediates the relationship between parenting style and sense of security among 3-6-year-old Chinese…
Descriptors: Foreign Countries, Young Children, Preschool Children, Preschool Education
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Jordan – Journal of Further and Higher Education, 2023
Cyber security is a growing area of international importance, with shortages present for cyber security skills. While many universities have introduced degree programmes for cyber security, the major focus of these programmes is on the development of technical skills with some reports indicating how graduates of these courses lack in softer skills…
Descriptors: Computer Security, Information Security, Computer Science Education, Teaching Methods
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abasi-amefon O. Affia; Alexander Nolte; Raimundas Matulevicius – Informatics in Education, 2023
While Internet of Things (IoT) devices have increased in popularity and usage, their users have become more susceptible to cyber-attacks, thus emphasizing the need to manage the resulting security risks. However, existing works reveal research gaps in IoT security risk management frameworks where the IoT architecture -- building blocks of the…
Descriptors: Internet, Equipment, Information Security, Risk Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Modesti, Paolo – Informatics in Education, 2020
As the number of software vulnerabilities discovered increases, the industry is facing difficulties to find specialists to cover the vacancies for security software developers. Considering relevant teaching and learning theories, along with existing approaches in software security education, we present the pedagogic rationale and the concrete…
Descriptors: Computer Security, Computer Software, Computer Science Education, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nur Suhaili Mansor; Hapini Awang; Ramlan Mustapha; Nurul Izzah Mohamad Ghozali – Online Submission, 2023
This study explores the current understanding of data security among students within the Malaysian higher education system. The focus is on evaluating how well the respondents grasp two critical aspects: knowledge related to securing social media platforms and a broader comprehension of data security measures. To gather insights, a meticulously…
Descriptors: College Students, Foreign Countries, Social Media, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Gümüs, Muhammed Murat; Çakir, Recep; Korkmaz, Özgen – Education and Information Technologies, 2023
Today, with digital technologies being in every aspect of our lives, cyberbullying and digital ethics, and digital security violations are emerging as concepts that threaten our digital world. It is thought that displaying ethical behavior and providing digital security in digital environments can increase sensitivity to cyberbullying. Here, it is…
Descriptors: Preservice Teachers, Bullying, Computer Mediated Communication, Ethics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Al-Azawei, Ahmed; Abdullah, Alharith A.; Mohammed, Mahmood K.; Abod, Zaid A. – International Review of Research in Open and Distributed Learning, 2023
Although online learning has become ubiquitous worldwide, earlier research has neglected the relationship between its actual use and security concerns. Learners' lack of security awareness while using learning technologies remains rarely studied. This paper integrates Delone and McLean's information system success (D&M-ISS) model with the…
Descriptors: Foreign Countries, Online Courses, Electronic Learning, Success
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  1138