NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Balon, Tyler; Baggili, Ibrahim – Education and Information Technologies, 2023
Over the last decade, industry and academia have worked towards raising students' interests in cybersecurity through game-like competitions to fill a shortfall of cybersecurity professionals. Rising interest in video games in combination with gamification techniques make learning fun, easy, and addictive. It is crucial that cybersecurity curricula…
Descriptors: Competition, Computer Security, Information Security, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Hong, Wilson Cheong Hin; Chi, ChunYang; Liu, Jia; Zhang, YunFeng; Lei, Vivian Ngan-Lin; Xu, XiaoShu – Education and Information Technologies, 2023
A multitude of studies have suggested potential factors that influence internet security awareness (ISA). Some, for example, used GDP and nationality to explain different ISA levels in other countries but yielded inconsistent results. This study proposed an extended knowledge-attitude-behaviour (KAB) model, which postulates an influence of the…
Descriptors: Foreign Countries, College Students, College Graduates, Employment
Peer reviewed Peer reviewed
Direct linkDirect link
Al-araibi, Asma Ali Mosa; Naz'ri bin Mahrin, Mohd; Yusoff, Rasimah Che Mohd; Chuprat, Suriayati Binti – Education and Information Technologies, 2019
The rate of adoption of e-learning has increased significantly in most higher education institutions in the world. E-learning refers to the use of electronic media, educational technology, also; information and communication technology (ICT) in the educational process. The aim for adopting e-learning is to provide students with educational…
Descriptors: Electronic Learning, Learning Readiness, Educational Technology, Information Technology