Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Descriptor
Computer Security | 4 |
Standards | 4 |
Information Security | 3 |
Audits (Verification) | 2 |
Compliance (Legal) | 2 |
Computer Software | 2 |
Educational Quality | 2 |
Guidelines | 2 |
Risk | 2 |
Risk Assessment | 2 |
Accreditation (Institutions) | 1 |
More ▼ |
Source
International Journal on… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Journal of Technology and… | 1 |
Author
Alper Yayla | 1 |
Bernard Ngalim | 1 |
Brandi Robinson | 1 |
Daisy Imbaquingo | 1 |
Javier Díaz | 1 |
José Jácome | 1 |
Mohammed Salem Al-Atoum | 1 |
Muhammad Al-Abdullah | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 2 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Cameroon | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Brandi Robinson – International Journal on E-Learning, 2024
The integration of artificial intelligence in e-learning presents promising avenues for scalable, efficient content creation. However, the prevailing content-first approach in AI course design often compromises educational quality for speed, leading to courses that lack coherence, cognitive alignment, and structured progression. This article…
Descriptors: Artificial Intelligence, Computer Software, Technology Uses in Education, Ethics