Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Standards | 4 |
Ethics | 2 |
Information Technology | 2 |
Internet | 2 |
Relevance (Education) | 2 |
Safety | 2 |
Surveys | 2 |
Case Studies | 1 |
Certification | 1 |
College Curriculum | 1 |
More ▼ |
Source
Education Digest: Essential… | 1 |
Journal of Digital Learning… | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Author
Alper Yayla | 1 |
Dhillon, Harpal S. | 1 |
Dhillon, Manpreet | 1 |
Hentea, Mariana | 1 |
Mohammed Salem Al-Atoum | 1 |
Muhammad Al-Abdullah | 1 |
Pusey, Portia | 1 |
Sadera, William A. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Evaluative | 4 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Grade 12 | 1 |
Grade 2 | 1 |
Grade 3 | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
Grade 7 | 1 |
More ▼ |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Muhammad Al-Abdullah; Alper Yayla; Mohammed Salem Al-Atoum – Journal of Information Systems Education, 2024
In today's cybersecurity landscape, organizations need frameworks that provide a holistic approach to risk assessment as part of the risk management process. This case introduces SecureEnd Solutions, a rapidly growing cybersecurity company, and its core team, including Alan Touring, Ada Lovecode, Bob Jobs, and Suzan, the head of development. The…
Descriptors: Risk Assessment, Risk Management, Computer Security, Holistic Approach
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics
Pusey, Portia; Sadera, William A. – Journal of Digital Learning in Teacher Education, 2012
In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related and Internet-capable technologies into instructional settings to improve student learning. Many presume that preservice teachers have the knowledge to competently model and teach issues of safety when working with these devices as…
Descriptors: Preservice Teacher Education, Preservice Teachers, Standards, Laws
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)