Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Science Education | 7 |
Information Security | 7 |
Risk | 7 |
Computer Security | 5 |
Access to Information | 2 |
Accounting | 2 |
Computer Software | 2 |
Crime | 2 |
Data Analysis | 2 |
Deception | 2 |
Engineering Education | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Advances in Accounting… | 1 |
Advances in Engineering… | 1 |
Digital Promise | 1 |
Education and Information… | 1 |
International Association for… | 1 |
Author
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Adult Education | 1 |
Audience
Location
Australia | 1 |
California | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
Florida | 1 |
India | 1 |
North Carolina | 1 |
Ohio | 1 |
Oregon | 1 |
Poland | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Jeremy Roschelle; Judi Fusco; Pati Ruiz – Digital Promise, 2024
As Artificial Intelligence within education becomes increasingly important, Digital Promise reviewed the guidance documents released by seven states--California, North Carolina, Ohio, Oregon, Virginia, Washington state, and West Virginia--on how to approach artificial intelligence (AI) in education. Throughout this report the authors summarize the…
Descriptors: Artificial Intelligence, Technology Uses in Education, Employment Qualifications, Responsibility
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Saeed J. Roohani; Xiaochuan Zheng – Advances in Accounting Education: Teaching and Curriculum Innovations, 2019
With recent increases in cybersecurity incidents, it is imperative to supplement current accounting curriculum, equip accounting graduates with sufficient knowledge and skills to assess cybersecurity risk, and learn about controls to mitigate such risks. In this chapter, the authors describe 10 teaching modules, supported by 10 professionally…
Descriptors: Accounting, Professional Education, Business Administration Education, Risk
Sims, J. Eric – ProQuest LLC, 2012
Information security has been a particularly hot topic since the enhanced internal control requirements of Sarbanes-Oxley (SOX) were introduced in 2002. At about this same time, cloud computing started its explosive growth. Outsourcing of mission-critical functions has always been a gamble for managers, but the advantages of cloud computing are…
Descriptors: Information Security, Computer Science Education, Clearinghouses, Data Analysis
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology