Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
College Students | 5 |
Computer Security | 5 |
Questionnaires | 5 |
Computer Networks | 3 |
Higher Education | 3 |
Information Technology | 3 |
Classification | 2 |
College Faculty | 2 |
Foreign Countries | 2 |
Glossaries | 2 |
Information Security | 2 |
More ▼ |
Author
Hawkins, Brian L. | 2 |
Rudy, Julia A. | 2 |
Hwang, Jae-Won | 1 |
Ibrahim, Walid | 1 |
Kim, Rosemary | 1 |
Monfils, Barbara | 1 |
Trabelsi, Zouheir | 1 |
Yoon, Cheolho | 1 |
Publication Type
Reports - Research | 3 |
Tests/Questionnaires | 3 |
Journal Articles | 2 |
Numerical/Quantitative Data | 2 |
Reports - Descriptive | 2 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Audience
Location
South Korea | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Trabelsi, Zouheir; Ibrahim, Walid – Journal of Information Technology Education: Innovations in Practice, 2013
Nowadays, many academic institutions are including ethical hacking in their information security and Computer Science programs. Information security students need to experiment common ethical hacking techniques in order to be able to implement the appropriate security solutions. This will allow them to more efficiently protect the confidentiality,…
Descriptors: Ethics, Information Security, Computer Security, Confidentiality
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2008
EDUCAUSE Core Data Service Fiscal Year 2007 Summary Report summarizes much of the data collected through the 2007 EDUCAUSE core data survey about campus information technology (IT) environments at 994 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Monfils, Barbara – 1993
As more people become computer literate, issues of privacy become more pertinent. Major privacy issues at the individual, national, and international levels are identified in the first part of the paper. These issues provide the basis for the second part of the paper, which is a report of a survey in which subjects were asked to indicate whether…
Descriptors: College Students, Computer Security, Confidential Records, Higher Education
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification