NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 20 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Desmet, Ophélie A.; Crimmins, Danielle M.; Flewellen, Gerniya; Seigfried-Spellar, Kathryn C. – Gifted Child Today, 2023
The purpose of the present study was to evaluate a cybersecurity and digital forensics enrichment program for gifted and talented students to determine students' perceptions of this enrichment course. We evaluated data from 25 secondary education students and one educator to examine their perceptions of the program. Responses from students and the…
Descriptors: Academically Gifted, Secondary School Students, Student Attitudes, Program Evaluation
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Almuhaideb, Abdullah M.; Saeed, Saqib – Journal of Information Systems Education, 2021
ABET accreditation has become a well-known standard for academic programs not only in the U.S. but also across the globe. Instantiating the processes to systematically improve the quality of programs is a daunting task for higher education institutions. In this contribution, we provide a detailed process-based framework that can assist aspiring…
Descriptors: Engineering Education, Accreditation (Institutions), Computer Security, Crime
Valdes, Edgar – ProQuest LLC, 2022
The aim of this study is to understand the Tor browser and its multiple applications as related to cybersecurity. The study also argues that most internet users are not aware of the danger they face when navigating the dark web. This research explores top executives' and specialized employees' awareness and understating of the hidden areas of…
Descriptors: Foreign Countries, Computer Security, Internet, Crime
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Ricci, Joseph; Breitinger, Frank; Baggili, Ibrahim – Education and Information Technologies, 2019
Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link the security chain. Therefore, this survey focused on analyzing the interest for adults for 'cyber threat eduction seminars', e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand…
Descriptors: Computer Security, Crime, Adults, Seminars
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Morsey, Christopher – ProQuest LLC, 2017
In the critical infrastructure world, many critical infrastructure sectors use a Supervisory Control and Data Acquisition (SCADA) system. The sectors that use SCADA systems are the electric power, nuclear power and water. These systems are used to control, monitor and extract data from the systems that give us all the ability to light our homes…
Descriptors: Information Security, Computer Security, National Security, Energy
Chapman, John – Higher Education Policy Institute, 2019
Higher education regularly experiences cyber attacks. Organisations that do not adequately protect themselves risk the loss or exposure of personal student and staff data and also commercial, institutional and research data that are valuable to cyber criminals operating domestically and internationally. This paper discusses: (1) the current…
Descriptors: Higher Education, Internet, Information Security, Computer Security
Henry A. Dixon – ProQuest LLC, 2022
Through quantitative research, this study seeks to identify the specific method campus police employ to investigate cybercrime, then identify demographic characteristics (variables) of the agencies that permit or limit the agency's method of response. The correlation between demographic characteristics and the resulting response method represents…
Descriptors: Campuses, Police, Police School Relationship, Crime
Li, Weifeng – ProQuest LLC, 2017
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and…
Descriptors: Social Media, Information Security, Role, Crime
Previous Page | Next Page »
Pages: 1  |  2