Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Foreign Countries | 5 |
Information Security | 5 |
Higher Education | 3 |
Adolescents | 2 |
College Students | 2 |
Computer Mediated… | 2 |
Computer Simulation | 2 |
Crime | 2 |
Educational Technology | 2 |
Faculty Development | 2 |
More ▼ |
Author
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Collected Works - Proceedings | 2 |
Books | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Italy | 5 |
Germany | 2 |
Greece | 2 |
India | 2 |
Mexico | 2 |
Portugal | 2 |
Turkey | 2 |
United Kingdom | 2 |
Australia | 1 |
Austria | 1 |
Belgium | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Esra Merve Çaliskan; I?rem I?tegin – Journal of Cybersecurity Education, Research and Practice, 2024
With the development of technology, security, a core human concern throughout history, has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of…
Descriptors: Gender Differences, Computer Security, Information Security, Sex Role
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Opesade, Adeola O.; Adesina, Omolayo A. – Journal of Cybersecurity Education, Research and Practice, 2020
The use of the Internet among children and adolescents is now a norm in many parts of the world. As the Internet offers a wide range of benefits to these ones, so does it expose them to possible various risks and harm. Researchers in different countries across the world have engaged in the production of relevant research-based knowledge in order…
Descriptors: Internet, Computer Security, Information Security, Children
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation