Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Age Differences | 5 |
Computer Security | 5 |
Gender Differences | 3 |
Privacy | 2 |
Technological Literacy | 2 |
Access to Computers | 1 |
Administrator Attitudes | 1 |
Adoption (Ideas) | 1 |
Attitudes | 1 |
Classification | 1 |
College Students | 1 |
More ▼ |
Source
ProQuest LLC | 5 |
Publication Type
Dissertations/Theses -… | 5 |
Education Level
Elementary Education | 1 |
High Schools | 1 |
Higher Education | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Pennsylvania | 1 |
Puerto Rico | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Smiley, Garrett – ProQuest LLC, 2013
E-learning has grown to such an extent that paper-based testing is being replaced by computer-based testing otherwise known as e-exams. Because these e-exams can be delivered outside of the traditional proctored environment, additional authentication measures must be employed in order to offer similar authentication assurance as found in…
Descriptors: Computer Assisted Testing, Licensing Examinations (Professions), Computer Security, Pretests Posttests
Rivera Vazquez, Juan C. – ProQuest LLC, 2012
Cyber crime is a term used to describe the abuse and misuse of a computer system where it is at a loss for someone across the world. It also refers to crimes committed by, or with computers via the Internet or only accessing a computer, is to steal or manipulate information of a company or a person and to use as a means for traditional such as…
Descriptors: Crime, Computer Security, Attitudes, Questionnaires
Suppo, Chris A. – ProQuest LLC, 2013
The purpose of this study was to investigate digital citizenship in Pennsylvania public schools based on the responses of school leaders including superintendents, curriculum coordinators, and technology coordinators. This study examined the relationship between Pennsylvania school leader's beliefs and the implementation of digital citizenship…
Descriptors: Public Schools, Administrator Attitudes, Correlation, Educational Technology
Francisco, James R. – ProQuest LLC, 2010
Health care is one of the most highly regulated industries in the United States. The Health Insurance Portability and Accountability Act of 1996 (HIPAA) mandates the implementation of information systems security to protect the personal information of patients. Properly planned implementations ease the process of introducing new technologies like…
Descriptors: Nurses, Federal Legislation, Nursing, Information Systems