NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 91 to 105 of 1,497 results Save | Export
Howell, Ashley – Advanced Distributed Learning Initiative, 2022
A federated Enterprise Learner Record Repository (ELRR) provides the ability to look across many distributed learner records as if they were from a single source and enables the sharing of local and global learner data across the DoD. This learner data will be pulled from authoritative sources for publishing, customizing, and harmonizing…
Descriptors: Student Records, Training, Computer Uses in Education, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Feray Küçükbas Duman – European Journal of Education (EJED), 2022
The most practical and fastest way to access information in today's world is via the internet. Thanks to the internet, the necessary information can be reached in a short time. Nevertheless, in addition to the benefits of the internet, it can also pose risks for users. For this reason, it is important to increase the level of awareness of…
Descriptors: Undergraduate Students, Physical Education, Student Behavior, Internet
Keith A. Jordan – ProQuest LLC, 2022
Despite significant cybersecurity policy, a prioritization of funding, and increased cybersecurity workforce training, DoD operational testers continue to find critical cyber vulnerabilities in its Weapon and Control Systems that result in the warfighter's lack of ability to "fight through" when faced with a cyber-contested environment…
Descriptors: Training, Computer Security, Government (Administrative Body), Government Employees
Peer reviewed Peer reviewed
Direct linkDirect link
Sara Ricci; Simon Parker; Jan Jerabek; Yianna Danidou; Argyro Chatzopoulou; Remi Badonnel; Imre Lendak; Vladimir Janout – IEEE Transactions on Education, 2024
Demand for cybersecurity professionals from industry and institutions is high, driven by an increasing digitization of society and the growing range of potential targets for cyber attacks. However, despite this pressing need a significant shortfall in the number of cybersecurity experts remains and a discrepancy has emerged between the skills…
Descriptors: Information Security, Computer Security, Classification, Barriers
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Christina M. Puntasecca – ProQuest LLC, 2024
Engaging recent points of discussion within academia and practitioner research focused on access/ibility in the cybersecurity workplace, this dissertation examines the impacts of National Initiative for Cybersecurity Education (NICE) cybersecurity workforce frameworks on people and communities within the field of cybersecurity. The emerging era in…
Descriptors: Computer Security, Communications, Labor Force Development, Guided Pathways
Jaye-Jaye Johnson – ProQuest LLC, 2024
Educational technology (EdTech) interoperability throughout cyberspace provides the financial opportunity for collecting and selling of student privacy information. The research problem addressed throughout this study is the public school district leaders' (SDLs) understanding of EdTech cyber security practices and policies (EdTechCSPP). Little is…
Descriptors: Public Schools, School Districts, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Peer reviewed Peer reviewed
Direct linkDirect link
Hendrickson, Peggy Bell – College and University, 2021
This article is the second of a two-part series on best practices in receiving digital documents. Part I focused on national databases, third-party digital repositories, institutional websites, and certified documents. Part II looks at a problematic and prevalent of digital records options: email attachments. It discusses the security of email and…
Descriptors: Electronic Mail, Computer Security, Computer Uses in Education, Information Management
Boyce, Stephen – ProQuest LLC, 2021
The world continues to be plagued by cyber incidents that impact businesses, schools, hospitals, and government institutions. Some organizations have given cybersecurity a line item on the annual budget, while others have created dedicated departments to improve their technical defenses. Executive boards and C-level executives have shifted from an…
Descriptors: Demography, Decision Making, Computer Security, Undergraduate Students
Peer reviewed Peer reviewed
Direct linkDirect link
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ricci, Joseph; Breitinger, Frank; Baggili, Ibrahim – Education and Information Technologies, 2019
Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link the security chain. Therefore, this survey focused on analyzing the interest for adults for 'cyber threat eduction seminars', e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand…
Descriptors: Computer Security, Crime, Adults, Seminars
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  100