Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 8 |
Descriptor
| Computer Security | 8 |
| Interviews | 8 |
| Information Security | 6 |
| Qualitative Research | 6 |
| Case Studies | 4 |
| Foreign Countries | 3 |
| Administrator Attitudes | 2 |
| Armed Forces | 2 |
| Barriers | 2 |
| College Faculty | 2 |
| Information Technology | 2 |
| More ▼ | |
Author
| Armstead, Stanley K. | 1 |
| Cooper, Paul K. | 1 |
| Costa, Conceição | 1 |
| Henriques, Sara | 1 |
| Leteane, Oratile | 1 |
| Liesen, Joseph J. | 1 |
| Moakofhi, Moakofhi | 1 |
| Phiri, Tawona | 1 |
| Pholele, Thato | 1 |
| Rogado, José | 1 |
| Sadaghiani-Tabrizi, Avideh | 1 |
| More ▼ | |
Publication Type
| Dissertations/Theses -… | 6 |
| Journal Articles | 2 |
| Reports - Research | 2 |
Education Level
| Higher Education | 3 |
| Elementary Education | 1 |
Audience
Location
| Afghanistan | 1 |
| Botswana | 1 |
| Florida | 1 |
| Iraq | 1 |
| New York | 1 |
Laws, Policies, & Programs
| United Nations Convention on… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Singletary, Tod J. – ProQuest LLC, 2017
The United States Military has become increasingly dependent upon technology to meet its mission objectives with a consequence being greater dependence on civilian defense contractors to provide specialized services in support of high-tech mission requirements. Modern military defense contractors have also become dependent upon reliable and secure…
Descriptors: Armed Forces, Information Security, Risk, Outsourcing
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Liesen, Joseph J. – ProQuest LLC, 2017
The higher education industry uses the very latest technologies to effectively prepare students for their careers, but these technologies often contain vulnerabilities that can be exploited via their connection to the Internet. The complex task of securing information and computing systems is made more difficult at institutions of higher education…
Descriptors: Qualitative Research, Case Studies, Barriers, Small Colleges
Armstead, Stanley K. – ProQuest LLC, 2017
In today's dynamic military environment, information technology plays a crucial role in the support of mission preparedness and operational readiness. This research examined the effectiveness of information technology security simulation and awareness training on U.S. military personnel in Iraq and Afghanistan. Also, the study analyzed whether…
Descriptors: Military Personnel, Foreign Countries, Computer Security, Information Security
Sadaghiani-Tabrizi, Avideh – ProQuest LLC, 2018
The educational system has been challenging children through competitive societal information-age education by promoting achievement among students, in preparing children for global excellence. This qualitative research case study of elementary school children's lack in cybersecurity knowledge and awareness served helpful with exploration into…
Descriptors: Computer Security, Computer Science Education, Internet, Elementary School Curriculum
Cooper, Paul K. – ProQuest LLC, 2017
There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…
Descriptors: Information Security, Crime, Computer Security, Risk
Costa, Conceição; Sousa, Carla; Rogado, José; Henriques, Sara – International Journal of Game-Based Learning, 2017
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception. According to Livingstone, Carr and Byrne (2015), Internet governance…
Descriptors: Foreign Countries, Treaties, Childrens Rights, International Law
Moakofhi, Moakofhi; Leteane, Oratile; Phiri, Tawona; Pholele, Thato; Sebalatlheng, Perncy – International Journal of Education and Development using Information and Communication Technology, 2017
The integration of technology in the education process has immensely improved the acquisition and retention of knowledge. Although e-learning initiatives bring many advantages to the education system, these rewards have not been fully realised in developing countries like Botswana. Therefore, in the current study, authors set out to identify…
Descriptors: Foreign Countries, Electronic Learning, Barriers, Agricultural Education

Direct link
Peer reviewed
