Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Attitudes | 3 |
Computer Security | 3 |
Information Security | 2 |
Self Efficacy | 2 |
Administrator Attitudes | 1 |
Administrators | 1 |
Anxiety | 1 |
Attitude Change | 1 |
Business | 1 |
College Students | 1 |
Computer Use | 1 |
More ▼ |
Source
ProQuest LLC | 3 |
Publication Type
Dissertations/Theses -… | 3 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Michigan | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Emilio J. Del Riego – ProQuest LLC, 2024
This qualitative descriptive research study was conducted to explore the impact that transformational leadership and innovation have in creating a cybersecurity conscious organizational culture. The value of having a cybersecurity conscious organizational culture through transformational leadership and innovation is described in line with higher…
Descriptors: Transformational Leadership, Information Security, Computer Security, Organizational Culture
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Reddy, Dinesh Sampangirama – ProQuest LLC, 2017
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Descriptors: Computer Security, Information Security, Information Technology, Self Efficacy