Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Descriptor
Computer Networks | 6 |
Information Security | 6 |
Computer Security | 5 |
Information Technology | 4 |
Computer Software | 3 |
Crime | 3 |
Artificial Intelligence | 2 |
Best Practices | 2 |
Computer Science Education | 2 |
Data | 2 |
Foreign Countries | 2 |
More ▼ |
Author
Abhishek Vaish | 1 |
Bui Thanh Hung | 1 |
Carlos Novo | 1 |
Frank Xavier Gearhart | 1 |
Gayatri Parasa | 1 |
Grace Kamau | 1 |
Joel Nakitare | 1 |
Prasun Chakrabarti | 1 |
Ravindra Kumar | 1 |
Rene Ekoteson | 1 |
Rolando Martins | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 2 |
Reports - Research | 2 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
S. Siva Shankar; Bui Thanh Hung; Prasun Chakrabarti; Tulika Chakrabarti; Gayatri Parasa – Education and Information Technologies, 2024
Modern life is increasingly influenced by networks, making cybersecurity a crucial area of study. However, due to their few resources and varied makeup, they are more vulnerable to a wide range of cyber-attacks. Such risks result in sensitive information being stolen as well as financial and reputational harm to firms. How far malicious detection…
Descriptors: Learning Processes, Artificial Intelligence, Information Security, Computer Security
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Joel Nakitare; Salome Mathangani; Grace Kamau – portal: Libraries and the Academy, 2024
Effective research data management (RDM) is essential to modern scientific investigations. As the volume and complexity of research data increase, researchers, research institutions, and countries are pressured to improve data management practices to ensure transparency, reproducibility, sharing, and reuse of their findings. Researchers and…
Descriptors: Foreign Countries, Information Management, Research, Data
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security