Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Descriptor
Computer Security | 5 |
Guidelines | 5 |
Information Security | 4 |
Audits (Verification) | 2 |
Compliance (Legal) | 2 |
Computer Science Education | 2 |
Crime | 2 |
Risk | 2 |
Standards | 2 |
Accreditation (Institutions) | 1 |
Barriers | 1 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
European Journal of Education | 1 |
Journal of Cybersecurity… | 1 |
Journal of Technology and… | 1 |
Malaysian Online Journal of… | 1 |
Author
Abdel-Karim Al-Tamimi | 1 |
Bernard Ngalim | 1 |
Daisy Imbaquingo | 1 |
Javier Díaz | 1 |
José Jácome | 1 |
K. Thiyagu | 1 |
Kalle Grill | 1 |
Karin Danielsson | 1 |
Khalid Samara | 1 |
Lena Enqvist | 1 |
Loïs Vanhée | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Practitioners | 1 |
Location
Cameroon | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation