NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 30 results Save | Export
Kevin Dennis – ProQuest LLC, 2024
The first step to improving an organization's security posture is to define the organization's security goals. At a technical level, these goals are expressed as security policies. Security policies are predicates over programs, that return true or false if the program adheres to the policy. Defining these policies correctly is thus essential to…
Descriptors: Information Security, Computer Security, Policy, Integrity
David R. E. Halla – ProQuest LLC, 2024
The study investigated the use of formalized cybersecurity apprenticeships as a means of workforce development to meet the needs of employers seeking to fill cybersecurity positions. The study employed a quantitative analysis using a constructivist grounded theory approach utilizing a survey with questions based on the findings of apprenticeships…
Descriptors: Computer Security, Labor Force Development, Apprenticeships, Models
Cheryl Resch – ProQuest LLC, 2024
Software vulnerabilities in commercial products are an issue of national importance. The most prevalent breaches are input validation vulnerabilities, and these are easily avoidable. This dissertation contributes to cybersecurity education with a set of hands-on interventions tailored for three CS courses, a set of reflection prompts to encourage…
Descriptors: College Students, Computer Science Education, Computer Security, Curriculum Development
Mengjiao Zhang – ProQuest LLC, 2024
The rise of Artificial Intelligence technology has raised concerns about the potential compromise of privacy due to the handling of personal data. Private AI prevents cybercrimes and falsehoods and protects human freedom and trust. While Federated Learning offers a solution by model training across decentralized devices or servers, thereby…
Descriptors: Privacy, Cooperative Learning, Natural Language Processing, Learning Processes
Richard E. Taylor – ProQuest LLC, 2024
The problem addressed in this research study is that multinational organizations that often disregard adopting cybersecurity threat awareness training in the workplace to protect their cyberinfrastructure assets cannot efficiently detect and respond to malicious advance persistent threat (APT) cyberattacks. There is a disconnect between security…
Descriptors: Computer Security, Consciousness Raising, International Organizations, Training
Brian Khoa Ngac – ProQuest LLC, 2024
Curriculum development is currently being done in a variety of ways: individually, with peers, through an academic committee that may or may not have an industry representative, or through workshops. But the current ways of developing curriculum have challenges and inefficiencies, specifically when using groups and committee (logistical…
Descriptors: Expertise, Cooperation, Curriculum Development, Computer Security
Hrishikesh Bhide – ProQuest LLC, 2024
The meteoric rise in software and technology has altered the paradigm of information security and privacy. Classified information, stored earlier behind locked doors, is now stored on the internet on servers that can be accessed from anywhere on the globe. As a result of these advancements, we are now vulnerable to cyber-attacks. Cyber-attacks are…
Descriptors: Game Based Learning, Learning Strategies, Computer Security, Computer Science Education
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Maurice Spates – ProQuest LLC, 2024
The cybersecurity talent gap has been a hot topic for most of the 2000s, yet only one aspect or viewpoint of the gap has been investigated: that of the employers. Governmental and private organizations suggest what they think led to or is a contributing factor to the cybersecurity talent gap. This study detailed aspects that could contribute…
Descriptors: Job Applicants, Employment, Employment Qualifications, Computer Security
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Edem Kwesi Atatsi – ProQuest LLC, 2024
Organizations are looking for a well-qualified workforce with the requisite skills, knowledge, and abilities to implement an effective cyber strategy. Academic institutions are facing challenges in meeting the demand for employees with hands-on experience. This exploratory study investigated how academic institutions can use internships to equip…
Descriptors: Internship Programs, Entry Workers, Professional Personnel, Computer Security
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Patrick Ward – ProQuest LLC, 2024
This proposal is to develop a framework for designing a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges such as program accreditation, workforce development, and Department of Homeland Security/National Security Agency…
Descriptors: Community Colleges, College Programs, Computer Security, Internet
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
Previous Page | Next Page ยป
Pages: 1  |  2