Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Foreign Countries | 5 |
Information Security | 5 |
Cultural Influences | 3 |
Risk | 3 |
Barriers | 2 |
College Administration | 2 |
College Students | 2 |
Computer Assisted Testing | 2 |
Design | 2 |
Educational Environment | 2 |
More ▼ |
Author
Publication Type
Collected Works - Proceedings | 2 |
Reports - Research | 2 |
Books | 1 |
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Grade 1 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
Saudi Arabia | 5 |
China | 2 |
Croatia | 2 |
Albania | 1 |
Australia | 1 |
Costa Rica | 1 |
India | 1 |
Kentucky | 1 |
Morocco | 1 |
North Carolina | 1 |
Philippines | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Tahani Abdullah Abdurhman Alhumud; Abdulfattah Omar; Waheed M. A. Altohami – Cogent Education, 2023
Cybersecurity systems are crucial for safeguarding information assets across various sectors, including government, military, and commercial domains. In Saudi Arabia, cybersecurity has gained significant importance within the national security strategy, resulting in substantial investments in technologies to protect information assets, combat…
Descriptors: Information Security, Computer Security, Universities, Total Quality Management
Aljuaid, Alanoud – ProQuest LLC, 2022
There is a workforce shortage and a huge gender disparity in the cybersecurity profession globally and Saudi Arabia. Enabling women to access these opportunities involves bolstering training and implementing reforms to give women the go-ahead to access these opportunities. With only a paltry 5% of women being in cybersecurity in the Middle East…
Descriptors: Foreign Countries, Gender Differences, Computer Security, Information Security
A Model for an Information Security Risk Management (ISRM) Framework for Saudi Arabian Organisations
Alshareef, Naser – International Association for Development of the Information Society, 2016
Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…
Descriptors: Information Security, Risk, Qualitative Research, Foreign Countries
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology