Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Behavior Patterns | 5 |
| Knowledge Level | 5 |
| Correlation | 3 |
| Information Security | 3 |
| Statistical Analysis | 3 |
| Computer Security | 2 |
| Crime | 2 |
| Information Technology | 2 |
| Teaching Methods | 2 |
| Active Learning | 1 |
| Administrator Attitudes | 1 |
| More ▼ | |
Source
| ProQuest LLC | 5 |
Publication Type
| Dissertations/Theses -… | 5 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Skinner, Ann – ProQuest LLC, 2018
Resource-based theory provided the theoretical foundation to investigate the extent that developer knowledge correlated to success of information technology (IT) development projects. Literature indicated there was a knowledge gap in understanding whether developer information system development, behavior and business knowledge contributed to IT…
Descriptors: Information Technology, Information Systems, Correlation, Prediction
Smith, Gwendolynn T. – ProQuest LLC, 2012
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
Descriptors: Federal Government, Employees, Users (Information), Futures (of Society)
Li, Rui – ProQuest LLC, 2013
Experts have a remarkable capability of locating, perceptually organizing, identifying, and categorizing objects in images specific to their domains of expertise. Eliciting and representing their visual strategies and some aspects of domain knowledge will benefit a wide range of studies and applications. For example, image understanding may be…
Descriptors: Visual Perception, Graduate Medical Education, Photography, Cognitive Processes

Direct link
