Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Guidelines | 6 |
Information Security | 4 |
Computer Science Education | 3 |
Foreign Countries | 3 |
Standards | 3 |
Curriculum Development | 2 |
Higher Education | 2 |
Job Skills | 2 |
Risk | 2 |
Risk Management | 2 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Higher Education, Skills and… | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Journal of Information… | 1 |
Journal of Technology and… | 1 |
Author
Abdel-Karim Al-Tamimi | 1 |
Alshareef, Naser | 1 |
Bohler, Jeffrey A. | 1 |
Daisy Imbaquingo | 1 |
Javier Díaz | 1 |
José Jácome | 1 |
Khalid Samara | 1 |
Larson, Benjamin | 1 |
Maher Salem | 1 |
Peachey, Todd A. | 1 |
Seng Thah, Soon | 1 |
More ▼ |
Publication Type
Reports - Research | 6 |
Journal Articles | 5 |
Speeches/Meeting Papers | 1 |
Audience
Location
Malaysia | 1 |
Netherlands | 1 |
Saudi Arabia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Spruit, Marcel – Higher Education, Skills and Work-based Learning, 2022
Purpose: The information security field requires standardised education. This could be based on generic job profiles and a standard competence framework. The question is whether this is possible and feasible. To find out, the author did a case study: developing an information security master curriculum based on a generic PVIB job profile and the…
Descriptors: Information Security, Computer Science Education, Profiles, Case Studies
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Bohler, Jeffrey A.; Larson, Benjamin; Peachey, Todd A.; Shehane, Ronald F. – Journal of Information Systems Education, 2020
Information systems education objectives must continually adapt to a dynamic marketplace for knowledge and skills. For faculty developing programs that better prepare students for this demanding environment, existing research and guidelines provide a foundation to develop relevant coursework. However, an examination of peer institutions indicates…
Descriptors: Information Systems, Computer Science Education, Curriculum Evaluation, Guidelines
A Model for an Information Security Risk Management (ISRM) Framework for Saudi Arabian Organisations
Alshareef, Naser – International Association for Development of the Information Society, 2016
Countries in the Gulf represent thriving, globally important commercial centres. They have embraced technology and modern management methods, often originating in the western countries. In adapting to quite different cultures these do not always operate as successfully. The adoption and practices of the Information Security Risk Management (ISRM)…
Descriptors: Information Security, Risk, Qualitative Research, Foreign Countries
Seng Thah, Soon – International Journal of Computer-Assisted Language Learning and Teaching, 2022
This study was conducted to determine the level of ICT competencies among Malaysian language teachers at both primary and secondary schools. The focus of this study was on four specific domains: 1) technological concepts and operational skills; 2) pedagogical skills; 3) professional skills; and 4) social, ethics, and security skills. These skills…
Descriptors: Language Teachers, Pedagogical Content Knowledge, Second Language Learning, Second Language Instruction