NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 220 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Sisi Long; Ting Zhu; Xizi Chen – Digital Education Review, 2023
Problematic Internet use (PIU) can lead to dysfunction and undesired consequences, especially in adolescents and youths. Studies have shown that personal emotional characteristics and relationships with others are associated with PIU. We pursue the neglected question of whether there is a correlation between personal ability, such as new media…
Descriptors: Internet, Media Literacy, College Students, Gender Differences
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Chapman, John – Higher Education Policy Institute, 2019
Higher education regularly experiences cyber attacks. Organisations that do not adequately protect themselves risk the loss or exposure of personal student and staff data and also commercial, institutional and research data that are valuable to cyber criminals operating domestically and internationally. This paper discusses: (1) the current…
Descriptors: Higher Education, Internet, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cusak, Austin – Journal of Cybersecurity Education, Research and Practice, 2023
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a…
Descriptors: Internet, Computer Security, Information Security, Labor Force Development
Peer reviewed Peer reviewed
Direct linkDirect link
Llorens, Ariadna; Prat, Joana; Pažur Anicic, Katarina – European Journal of Engineering Education, 2023
This paper analyses the effect that the fulfilment of the European Higher Education Area (EHEA) has got among engineers in the information and communication technologies (ICT) sector. The focus is on Spain, and the comparison of the technical and managerial knowledge and skills most demanded by the sector in 2008 and 2018, coinciding with the…
Descriptors: Foreign Countries, Information Technology, Employer Attitudes, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kabata, Victor – International Journal of E-Learning & Distance Education, 2022
This paper sought to establish the extent to which users' legitimate rights are safeguarded in Learning Management Systems (LMS); specifically, on the Blackboard system used for teaching at Sorbonne University, Abu Dhabi (SUAD). First, the users' legitimate rights that required protection were identified. Second, the security and privacy…
Descriptors: Foreign Countries, Integrated Learning Systems, Higher Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Chimbunde, Pfuurai – Educational Technology Research and Development, 2023
While the outbreak of COVID-19 in December 2019 threatened educational activities in Higher Education globally, it renewed the interest in online learning and teaching in developing countries. To frame our understanding, we employed the Technological Readiness Index lens to investigate the institutional needs necessitated by the sudden uptake of…
Descriptors: Foreign Countries, Higher Education, Online Courses, Readiness
Peer reviewed Peer reviewed
Direct linkDirect link
Towhidi, Gelareh; Pridmore, Jeannie – Journal of Information Systems Education, 2023
Cybersecurity is among the highest in-demand skills for Information Systems graduates and therefore is critical for the Information Systems curriculum. There is a substantial lack of skilled cybersecurity graduates. It is estimated that there is a global shortage of almost three and a half million cybersecurity professionals in 2022. Organizations…
Descriptors: Computer Security, Computer Science Education, Alignment (Education), Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Herr, Trey; Laudrain, Arthur P. B.; Smeets, Max – Journal of Political Science Education, 2021
Colleges and universities continue to expand their curricula to include cybersecurity as an explicit course of study in political science. But what is taught in a course on cybersecurity? Are syllabi deep dives into technology, broad romps through contemporary policy debates, or do they reflect a more varied disposition? Studying the syllabi of an…
Descriptors: Computer Science Education, Computer Security, Information Security, Political Science
Peer reviewed Peer reviewed
Direct linkDirect link
Almaiah, Mohammed Amin; Al-Khasawneh, Ahmad – Education and Information Technologies, 2020
The adoption of mobile cloud computing technology is still at an early stage of implementation in the university campus. This research aims to fill this gap by investigating the main factors that influence on the decision to adopt mobile cloud computing in the university campus. Therefore, this research proposes an integrated model, incorporating…
Descriptors: Information Storage, Handheld Devices, Computer Assisted Instruction, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Almuhaideb, Abdullah M.; Saeed, Saqib – Journal of Information Systems Education, 2021
ABET accreditation has become a well-known standard for academic programs not only in the U.S. but also across the globe. Instantiating the processes to systematically improve the quality of programs is a daunting task for higher education institutions. In this contribution, we provide a detailed process-based framework that can assist aspiring…
Descriptors: Engineering Education, Accreditation (Institutions), Computer Security, Crime
Kelly, Brian; McCormack, Mark; Reeves, Jamie; Brooks, D. Christopher; O'Brien, John – EDUCAUSE, 2021
In 2021, EDUCAUSE is publishing a second edition of the "Horizon Report." With this inaugural issue of the Information Security edition of the "Horizon Report," EDUCAUSE has sought to expand their series of Teaching and Learning "Horizon Reports" to focus on a new area of critical importance to the future of higher…
Descriptors: Information Security, Higher Education, Educational Trends, COVID-19
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  15