NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Shapna Sultana Pal – ProQuest LLC, 2022
Educators of graduate cybersecurity education lack decision methodologies to aid in selecting and prioritizing cybersecurity criteria and tools to provide hands-on learning in cyber courses. Educators are challenged with keeping the cybersecurity tools in the education curriculum relevant and updated. The risk of not doing so, is possibly…
Descriptors: Computer Security, Information Security, Computer Science Education, Decision Making
Bingle, YuLin G. – ProQuest LLC, 2022
Despite assertions and increased discussions about the effectiveness of undergraduate cybersecurity education, the evidence has been primarily anecdotal. Dialogue about cybersecurity education has tended to focus more on technical skills and less on soft skills. This research effort contended that cybersecurity experts with technical skills also…
Descriptors: Computer Security, Information Security, Technological Literacy, Soft Skills
Alqarni, Amani – ProQuest LLC, 2017
Cyber-attacks threaten the security of computer users' information, networks, machines, and privacy. Studies of computer security education, awareness, and training among ordinary computer users, college students, non-IT-oriented user groups, and non-technically trained citizens are limited. Most research has focused on computer security standards…
Descriptors: Computer Security, College Students, Student Behavior, Information Security
O'Brien, Churairat – ProQuest LLC, 2019
As young children increasingly use the Internet, the children need to learn and apply cybersecurity fundamentals to protect personal data. Teaching young students the basics of strong passwords and data protection in a K-12 classroom setting is an obvious starting point. The literature shows an absence of approved cybersecurity curriculums for use…
Descriptors: Teacher Attitudes, Information Security, Computer Security, Teaching Methods
Toombs, Austin Lewis – ProQuest LLC, 2016
Recent scholarship in Human-Computer Interaction, science and technology studies, and design research has focused on hacker communities as sites of innovation and entrepreneurship, novel forms of education, and the democratization of technological production. However, hacking practices are more than new technical practices; they are also…
Descriptors: Computer Security, Man Machine Systems, Technological Literacy, Participation
Walton, Marquetta – ProQuest LLC, 2016
The effectiveness of U.S. cyber-capabilities can have a serious effect on the cyber-security stance of the US and significantly impact how well U.S. critical infrastructures are protected. The problem is that the state of the U.S. cyber-security could be negatively impacted by the dependency that the US displays in its use of defensive…
Descriptors: Technological Literacy, Computer Security, Information Security, Qualitative Research
Suppo, Chris A. – ProQuest LLC, 2013
The purpose of this study was to investigate digital citizenship in Pennsylvania public schools based on the responses of school leaders including superintendents, curriculum coordinators, and technology coordinators. This study examined the relationship between Pennsylvania school leader's beliefs and the implementation of digital citizenship…
Descriptors: Public Schools, Administrator Attitudes, Correlation, Educational Technology