Publication Date
In 2025 | 5 |
Since 2024 | 32 |
Since 2021 (last 5 years) | 108 |
Since 2016 (last 10 years) | 152 |
Since 2006 (last 20 years) | 187 |
Descriptor
Source
Author
Marquardson, Jim | 3 |
Payne, Brian K. | 3 |
Brooks, D. Christopher | 2 |
Cigularova, Daniela | 2 |
Cummings, Jeff | 2 |
Daniel L. Segal | 2 |
David Kocsis | 2 |
Frydenberg, Mark | 2 |
Fulton, Eric | 2 |
Janicki, Thomas | 2 |
Lawrence, Cameron | 2 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 3 |
Community | 1 |
Policymakers | 1 |
Students | 1 |
Location
Maryland | 6 |
China | 5 |
India | 5 |
North Carolina | 5 |
Texas | 5 |
United Kingdom | 5 |
Florida | 4 |
Saudi Arabia | 4 |
Virginia | 4 |
California | 3 |
Europe | 3 |
More ▼ |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Digital Millennium Copyright… | 1 |
Elementary and Secondary… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Higher Education Act 1965 | 1 |
Higher Education Act Title IX | 1 |
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Ulrich A. Hoensch – PRIMUS, 2024
We present a concrete situation where there is a difference between the theoretical security of a cipher and its limitations when implemented in practice. Specifically, when entering a PIN, smudges on the keypad substantially reduce its security. We show how the number of possible keys in the presence of the "smudge attack" can be…
Descriptors: Information Security, Computer Security, Coding, Undergraduate Study
Brian Khoa Ngac – ProQuest LLC, 2024
Curriculum development is currently being done in a variety of ways: individually, with peers, through an academic committee that may or may not have an industry representative, or through workshops. But the current ways of developing curriculum have challenges and inefficiencies, specifically when using groups and committee (logistical…
Descriptors: Expertise, Cooperation, Curriculum Development, Computer Security
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Samuel C. Yang – Journal of Information Systems Education, 2024
Amid the ever-increasing number of cyberthreats, cybersecurity degree programs represent a potential growth area for business schools. This study examines undergraduate cybersecurity programs offered by AACSB-accredited business schools in the US. It surveyed 503 AACSB-accredited schools and identified 72 cybersecurity programs. Using the IS2020…
Descriptors: Computer Security, Information Security, Business Administration Education, Business Schools
Catal, Cagatay; Ozcan, Alper; Donmez, Emrah; Kasif, Ahmet – Education and Information Technologies, 2023
Due to the increasing number of cyber incidents and overwhelming skills shortage, it is required to evaluate the knowledge gap between cyber security education and industrial needs. As such, the objective of this study is to identify the knowledge gaps in cyber security graduates who join the cyber security workforce. We designed and performed an…
Descriptors: Computer Security, Information Security, College Programs, Knowledge Level
Popovska, Viktoria – New England Journal of Higher Education, 2022
Some of the most common cybersecurity threats are malware, ransomware, phishing and spam. For their victims, including higher education institutions (HEIs), cybercrimes range from inconveniences to data breaches to grand heists. The threat that cyberattacks pose for HEIs is extremely costly and increasingly frequent, according to April 2022…
Descriptors: Higher Education, Information Security, Computer Security, Majors (Students)
Patrick Ward – ProQuest LLC, 2024
This proposal is to develop a framework for designing a cybersecurity program. The goal of the program is to prepare students graduating from an accredited two-year college for success in cybersecurity careers. Several challenges such as program accreditation, workforce development, and Department of Homeland Security/National Security Agency…
Descriptors: Community Colleges, College Programs, Computer Security, Internet
Owusu, Samuel – ProQuest LLC, 2023
Cybersecurity job roles and responsibilities constantly evolve due to technological advancements, complex infrastructure, and increasing cybersecurity threats and regulations. As a result, organizations require a highly skilled and experienced cybersecurity workforce in both the public and private sectors. Many colleges and universities offer…
Descriptors: Computer Security, Information Security, Computer Science Education, Models
Michael Dean Barker – ProQuest LLC, 2023
The emergence of new credentials is changing the landscape of traditional post-secondary education. The tight labor market's rising demand to fill vacancies in high-demand career fields such as cybersecurity has led to so-called "alternative credentials" to rapidly upskill and reskill existing professionals to move into the industry.…
Descriptors: Postsecondary Education, Credentials, Employment Qualifications, Labor Needs
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Heinrich, Matthew; Gerhart, Natalie – Journal of Information Systems Education, 2023
Mobile devices are a constantly used item in a college student's life. Students depend on them for entertainment, academics, and socializing with their friends. While they continually use them, they perhaps do not understand the impact of their use on their privacy or that the devices can be used to track them and collect their personal…
Descriptors: Privacy, Handheld Devices, College Students, Student Attitudes
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Serena Sullivan – ProQuest LLC, 2022
The complexity and frequency of online attacks have been steadily increasing; additional privacy protection and security measures are necessary for individuals to safeguard Personal Identifiable Information (PII). Challenges exist for Trinidad State College (TSC) students to improve online personal privacy protection behaviors. Protective…
Descriptors: Rural Schools, College Students, Privacy, Internet