Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Action Research | 5 |
Computer Security | 5 |
Foreign Countries | 2 |
Information Technology | 2 |
Models | 2 |
Program Effectiveness | 2 |
Training | 2 |
Academic Achievement | 1 |
Access to Computers | 1 |
After School Programs | 1 |
At Risk Students | 1 |
More ▼ |
Author
Amosun, Peter Adewale | 1 |
Choo, Kim-Kwang Raymond | 1 |
Clark, Christine Y. | 1 |
Ige, Olugbenga Adedayo | 1 |
Ng, Eugenia M. W., Ed. | 1 |
San Nicolas-Rocca, Tonia | 1 |
Sedlack, Derek J. | 1 |
Publication Type
Dissertations/Theses -… | 3 |
Books | 1 |
Collected Works - General | 1 |
Journal Articles | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Practitioners | 1 |
Researchers | 1 |
Location
Nigeria | 1 |
Pennsylvania | 1 |
South Africa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond – Education and Information Technologies, 2015
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Descriptors: Foreign Countries, Crime, Computer Security, Crime Prevention
Sedlack, Derek J. – ProQuest LLC, 2012
A critical overreliance on the technical dimension of information security has recently shifted toward more robust, organizationally focused information security methods to countermand $54 billion lost from computer security incidents. Developing a more balanced approach is required since protecting information is not an all or nothing…
Descriptors: Information Security, Computer Security, Risk, Models
Clark, Christine Y. – ProQuest LLC, 2013
Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…
Descriptors: Computer Security, Employees, Corporations, Training
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education