Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 8 |
Employees | 8 |
Information Security | 5 |
Confidentiality | 2 |
Higher Education | 2 |
Information Systems | 2 |
Information Technology | 2 |
Privacy | 2 |
Responsibility | 2 |
Access to Information | 1 |
Age Groups | 1 |
More ▼ |
Source
American School & University | 1 |
CUPA-HR Journal | 1 |
CURRENTS | 1 |
Community College Journal | 1 |
Education and Information… | 1 |
Educational Planning | 1 |
Journal of Cybersecurity… | 1 |
Journal on Educational… | 1 |
Author
Bangert-Drowns, Robert | 1 |
Baykal, Adnan | 1 |
Berg, George | 1 |
Bloniarz, Peter | 1 |
Daengsi, Therdpong | 1 |
Delio, Vince | 1 |
Gangolly, Jagdish | 1 |
Goel, Sanjay | 1 |
Hart, Kevin | 1 |
Hobbs, Jon | 1 |
Hurbanek, Thomas | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 6 |
Reports - Research | 2 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Daengsi, Therdpong; Pornpongtechavanich, Phisit; Wuttidittachotti, Pongpisit – Education and Information Technologies, 2022
Cybersecurity is crucial at present because cyber threats (e.g., phishing) have become a very common occurrence in everyday life. A literature review showed that there are no studies based on cybersecurity awareness which involved a large number of Thai users. Thus, this research focused on the cybersecurity awareness of approximately 20,000…
Descriptors: Information Security, Computer Security, Employees, Finance Occupations
Richardson, Michael D.; Lemoine, Pamela A.; Stephens, Walter E.; Waller, Robert E. – Educational Planning, 2020
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st century. Computer security is an essential instrument for protecting children, but K-12 schools are considered one of the most attractive targets for data privacy crimes often due to the less-than-effective cybersecurity practices in schools. The human…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Privacy
Ramlo, Susan E.; Nicholas, John B. – Journal of Cybersecurity Education, Research and Practice, 2020
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study…
Descriptors: Student Attitudes, Information Security, Best Practices, Computer Security
Skurnac, Steve – American School & University, 2012
Data security breaches in the educational sector can be devastating to institutions and the students and employees they serve. They carry the potential for identity theft, violations of federal and state laws, and loss of trust of students, alumni and employees. The Identity Theft Resource Center says that as of October 2011, education…
Descriptors: Video Technology, Employees, School Security, Electronics
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Hart, Kevin – CURRENTS, 2010
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Descriptors: Higher Education, Computer Security, Barriers, Confidentiality
Williams, Tracy – CUPA-HR Journal, 2003
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Descriptors: Human Resources, Colleges, Computer Security, Privacy
Goel, Sanjay; Pon, Damira; Bloniarz, Peter; Bangert-Drowns, Robert; Berg, George; Delio, Vince; Iwan, Laura; Hurbanek, Thomas; Schuman, Sandoor P.; Gangolly, Jagdish; Baykal, Adnan; Hobbs, Jon – Journal on Educational Resources in Computing, 2006
A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted…
Descriptors: Feedback (Response), Curriculum Development, Hospitals, Computer Security