NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Cheryl Resch – ProQuest LLC, 2024
Software vulnerabilities in commercial products are an issue of national importance. The most prevalent breaches are input validation vulnerabilities, and these are easily avoidable. This dissertation contributes to cybersecurity education with a set of hands-on interventions tailored for three CS courses, a set of reflection prompts to encourage…
Descriptors: College Students, Computer Science Education, Computer Security, Curriculum Development
Serena Sullivan – ProQuest LLC, 2022
The complexity and frequency of online attacks have been steadily increasing; additional privacy protection and security measures are necessary for individuals to safeguard Personal Identifiable Information (PII). Challenges exist for Trinidad State College (TSC) students to improve online personal privacy protection behaviors. Protective…
Descriptors: Rural Schools, College Students, Privacy, Internet
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Hari Prasad Challa – ProQuest LLC, 2024
The increasing complexity of modern power systems, coupled with the integration of diverse rapidly evolving technologies involving physical systems requiring cybersecurity, has presented significant challenges for engineers in the field and researchers in laboratory facilities. This research and dissertation presents the development of a…
Descriptors: Computer Security, Information Systems, Technology Integration, Information Technology
Emerick, Gerald John – ProQuest LLC, 2020
Despite the strong, global demand for talented workers, higher than average salaries, and relatively low education requirements (bachelor's degree) for computing fields such as cybersecurity, there continues to be a pipeline issue with graduating enough workers educated in cybersecurity to fill the demand in the United States and globally…
Descriptors: Computer Security, Information Security, Career Choice, Influences
Aljuaid, Alanoud – ProQuest LLC, 2022
There is a workforce shortage and a huge gender disparity in the cybersecurity profession globally and Saudi Arabia. Enabling women to access these opportunities involves bolstering training and implementing reforms to give women the go-ahead to access these opportunities. With only a paltry 5% of women being in cybersecurity in the Middle East…
Descriptors: Foreign Countries, Gender Differences, Computer Security, Information Security
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
Murphy, Colleen F. – ProQuest LLC, 2018
By 2020, the global need for information security professionals is expected to reach six million and the shortfall in meeting that need is expected to be over one and a half million. Not only is there a shortage of cybersecurity professionals but those who are graduates of a cybersecurity program are not adequately skilled to assume significant…
Descriptors: Instructional Design, Computer Security, Information Security, Labor Force Development
Jabbour, Khayrazad Kari – ProQuest LLC, 2011
Use of internet technologies is widespread in Lebanon. Technology has a revolutionary impact on our lives, behavior, and in particular a strong impact on our students. Part of our students every day routine is to use the computer and the Internet to play, learn, and communicate. Although most students use the computer and the Internet on a daily…
Descriptors: Foreign Countries, Ethics, Safety, Computer Security
Flinn, Michael Bradley – ProQuest LLC, 2009
With privacy concerns growing on a daily basis, it is important to understand how college students guard their personally identifiable information. Despite the students' perceived readiness and several studies on the topic, it is not fully understood what personally identifiable information college students are sharing via online social networks…
Descriptors: College Students, Internet, Social Networks, Grade Point Average