Publication Date
In 2025 | 0 |
Since 2024 | 30 |
Since 2021 (last 5 years) | 97 |
Since 2016 (last 10 years) | 145 |
Since 2006 (last 20 years) | 296 |
Descriptor
Computer Security | 296 |
Information Security | 127 |
Information Technology | 108 |
Internet | 53 |
Computer Software | 47 |
Computer Networks | 41 |
Risk | 36 |
Models | 35 |
Privacy | 32 |
Information Systems | 30 |
Training | 29 |
More ▼ |
Source
ProQuest LLC | 295 |
Online Submission | 1 |
Author
Publication Type
Dissertations/Theses -… | 296 |
Tests/Questionnaires | 2 |
Reports - Research | 1 |
Education Level
Audience
Administrators | 1 |
Location
Texas | 6 |
California | 3 |
District of Columbia | 3 |
Florida | 3 |
Tennessee | 3 |
United States | 3 |
Cameroon | 2 |
Jamaica | 2 |
Maryland | 2 |
Michigan | 2 |
New Jersey | 2 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kevin Dennis – ProQuest LLC, 2024
The first step to improving an organization's security posture is to define the organization's security goals. At a technical level, these goals are expressed as security policies. Security policies are predicates over programs, that return true or false if the program adheres to the policy. Defining these policies correctly is thus essential to…
Descriptors: Information Security, Computer Security, Policy, Integrity
David R. E. Halla – ProQuest LLC, 2024
The study investigated the use of formalized cybersecurity apprenticeships as a means of workforce development to meet the needs of employers seeking to fill cybersecurity positions. The study employed a quantitative analysis using a constructivist grounded theory approach utilizing a survey with questions based on the findings of apprenticeships…
Descriptors: Computer Security, Labor Force Development, Apprenticeships, Models
Cheryl Resch – ProQuest LLC, 2024
Software vulnerabilities in commercial products are an issue of national importance. The most prevalent breaches are input validation vulnerabilities, and these are easily avoidable. This dissertation contributes to cybersecurity education with a set of hands-on interventions tailored for three CS courses, a set of reflection prompts to encourage…
Descriptors: College Students, Computer Science Education, Computer Security, Curriculum Development
Mengjiao Zhang – ProQuest LLC, 2024
The rise of Artificial Intelligence technology has raised concerns about the potential compromise of privacy due to the handling of personal data. Private AI prevents cybercrimes and falsehoods and protects human freedom and trust. While Federated Learning offers a solution by model training across decentralized devices or servers, thereby…
Descriptors: Privacy, Cooperative Learning, Natural Language Processing, Learning Processes
Richard E. Taylor – ProQuest LLC, 2024
The problem addressed in this research study is that multinational organizations that often disregard adopting cybersecurity threat awareness training in the workplace to protect their cyberinfrastructure assets cannot efficiently detect and respond to malicious advance persistent threat (APT) cyberattacks. There is a disconnect between security…
Descriptors: Computer Security, Consciousness Raising, International Organizations, Training
Brian Khoa Ngac – ProQuest LLC, 2024
Curriculum development is currently being done in a variety of ways: individually, with peers, through an academic committee that may or may not have an industry representative, or through workshops. But the current ways of developing curriculum have challenges and inefficiencies, specifically when using groups and committee (logistical…
Descriptors: Expertise, Cooperation, Curriculum Development, Computer Security
Hrishikesh Bhide – ProQuest LLC, 2024
The meteoric rise in software and technology has altered the paradigm of information security and privacy. Classified information, stored earlier behind locked doors, is now stored on the internet on servers that can be accessed from anywhere on the globe. As a result of these advancements, we are now vulnerable to cyber-attacks. Cyber-attacks are…
Descriptors: Game Based Learning, Learning Strategies, Computer Security, Computer Science Education
Bonnie B. Chelette – ProQuest LLC, 2023
K-12 schools in Louisiana face unique cybersecurity challenges due to the state's high poverty rate, resource constraints, infrastructure weaknesses, and vulnerability to natural disasters. Public school systems in Louisiana have been particularly vulnerable to these attacks, with incidents of cyberattacks tripling in 2020 alone. The Louisiana…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Barriers
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Steven Ullman – ProQuest LLC, 2024
Modern Information Technology (IT) infrastructure and open-source software (OSS) have revolutionized our ability to access and process data, enabling us to tackle increasingly complex problems and challenges. While these technologies provide substantial benefits, they often expose users to vulnerabilities that can severely damage individuals and…
Descriptors: Artificial Intelligence, Information Technology, Information Systems, Computer Security
Cusak, Austin – ProQuest LLC, 2023
This study sought to understand how cybersecurity professionals in technical U.S. Federal Government (USFG) positions transition into first-time cybersecurity leader roles. The study also sought to explore which leadership competencies were used/developed in this transition and how those leaders gained the knowledge and skills to perform their…
Descriptors: Computer Security, Information Security, Government Employees, Federal Government
Katie Marie Gutierrez – ProQuest LLC, 2023
Organizations need help keeping their infrastructure and data secure because cybercrimes and cyberattacks are rising. It is known that the highest risk to any organization is the risk that end users present (Aljeaid, 2020; Yuan, 2021). The problem to be addressed in this study is that end-user employees' behavior remains the biggest reason for…
Descriptors: Computer Security, Information Security, Employees, Responsibility
Maurice Spates – ProQuest LLC, 2024
The cybersecurity talent gap has been a hot topic for most of the 2000s, yet only one aspect or viewpoint of the gap has been investigated: that of the employers. Governmental and private organizations suggest what they think led to or is a contributing factor to the cybersecurity talent gap. This study detailed aspects that could contribute…
Descriptors: Job Applicants, Employment, Employment Qualifications, Computer Security
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Edem Kwesi Atatsi – ProQuest LLC, 2024
Organizations are looking for a well-qualified workforce with the requisite skills, knowledge, and abilities to implement an effective cyber strategy. Academic institutions are facing challenges in meeting the demand for employees with hands-on experience. This exploratory study investigated how academic institutions can use internships to equip…
Descriptors: Internship Programs, Entry Workers, Professional Personnel, Computer Security