Publication Date
In 2025 | 0 |
Since 2024 | 11 |
Descriptor
Source
Journal of Cybersecurity… | 4 |
ProQuest LLC | 2 |
IEEE Transactions on Education | 1 |
International Journal of… | 1 |
Journal of Technology and… | 1 |
Psychology Learning and… | 1 |
SAGE Open | 1 |
Author
Abdullah Al Fahad | 1 |
Abu Saleh Md. Sohel-Uz-Zaman | 1 |
Aditya Narayan Hati | 1 |
Ahmed Imran Kabir | 1 |
Anna Drobná | 1 |
Anna E. Kosloski | 1 |
Anwesa Das | 1 |
Bulbul Ahamed | 1 |
Caroline Sutton Chubb | 1 |
Cyril Brom | 1 |
Daniel Olson | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Research | 9 |
Dissertations/Theses -… | 2 |
Education Level
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mancha J. Sekgololo – Journal of Cybersecurity Education, Research and Practice, 2024
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg…
Descriptors: Foreign Countries, Universities, Electronic Libraries, Academic Libraries
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Ryan Straight – Journal of Cybersecurity Education, Research and Practice, 2024
This study applies a posthuman lens to the National Initiative for Cybersecurity Education (NICE) Workforce Framework, examining two key Work Roles in cybersecurity education. Employing a novel posthuman coding scheme, the associated Tasks, Knowledge, and Skills (TKS) statements were analyzed. Findings reveal significant posthuman elements within…
Descriptors: Computer Security, Computer Science Education, Job Skills, Ability
Jacqui Taylor; Monica Whitty – Psychology Learning and Teaching, 2024
We propose that psychology graduates are uniquely placed to work in the cybersecurity industry due to their understanding of human behavior and the possession of skills needed to address cybersecurity issues. However, there are challenges in attracting psychology graduates to the cybersecurity industry as they may not be fully aware of how skills…
Descriptors: Psychology, Majors (Students), Student Attitudes, Literacy
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Kate Quintana; Caroline Sutton Chubb; Daniel Olson; Anna E. Kosloski – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has become increasingly important not only in the technology sector but in criminal justice professions as well, and significant challenges have arisen as a result. However, these challenges are not well discussed in the literature. To address this gap, and to study the cybersecurity trends impacting criminal justice professionals…
Descriptors: Computer Security, Knowledge Level, Criminal Law, Role Theory
Anwesa Das; Vinay Kumar; Aditya Narayan Hati; Sharda Bharti – IEEE Transactions on Education, 2024
Machine learning (ML) is increasingly utilized in the development and assurance of safety-critical systems (SCSs) nowadays, much like other complex problems. Safety is the topmost priority in SCS, hence, developers who are working in this area must possess extensive knowledge of both ML and SCS. This article presents a methodical investigation…
Descriptors: Artificial Intelligence, Computer Security, Engineering Education, Engineering
Florence Martin; Doreen Mushi; Siyu Long; Julie Bacak; Drew Polly; Weichao Wang; Lynn Ahlgrim-Delzell – Journal of Technology and Teacher Education, 2024
Digital safety involves protecting oneself, and one's personal information to mitigate the risks that are inherently associated with using digital technologies. This study employed a multi-method design to explore 26 inservice and preservice elementary teacher experiences from attending a professional development on digital safety and facilitating…
Descriptors: Safety, Preservice Teachers, Elementary School Teachers, Summer Programs
Bulbul Ahamed; Mohammad Rashed Hasan Polas; Ahmed Imran Kabir; Abu Saleh Md. Sohel-Uz-Zaman; Abdullah Al Fahad; Saima Chowdhury; Mrittika Rani Dey – SAGE Open, 2024
The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh. A sample of 430 university students from two public and three private universities provided the data in…
Descriptors: Student Empowerment, Information Security, Knowledge Level, College Students
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification