Publication Date
In 2025 | 2 |
Since 2024 | 8 |
Since 2021 (last 5 years) | 21 |
Since 2016 (last 10 years) | 43 |
Since 2006 (last 20 years) | 87 |
Descriptor
Computer Security | 92 |
Risk | 92 |
Information Security | 45 |
Internet | 33 |
Information Technology | 30 |
Foreign Countries | 23 |
Risk Management | 17 |
Knowledge Level | 16 |
Privacy | 15 |
Safety | 15 |
Computer Software | 14 |
More ▼ |
Source
Author
Hope, Andrew | 2 |
Adesina, Omolayo A. | 1 |
Adil Jeghal | 1 |
Ali Yahyaouy | 1 |
Alkaabi, Shamma | 1 |
Almohri, Hussain M. J. | 1 |
Alshareef, Naser | 1 |
Amin, Rohan Mahesh | 1 |
Anderson, Catherine L. | 1 |
Atkinson, Al | 1 |
Aytaç, Tufan | 1 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 4 |
Administrators | 2 |
Practitioners | 1 |
Location
California | 3 |
China | 3 |
India | 3 |
Portugal | 3 |
Saudi Arabia | 3 |
Spain | 3 |
United Kingdom | 3 |
United States | 3 |
Australia | 2 |
Canada | 2 |
Croatia | 2 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
Program for International… | 1 |
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Yukun Xu; Hui Li – IEEE Transactions on Learning Technologies, 2025
Primary school students, despite their vulnerability to cyberattacks, lack targeted cybersecurity education. Using Scopus and Google Scholar, this scoping review analyzed 15 articles (2014-2024) following Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) Extension for Scoping Reviews guidelines to examine the landscape of…
Descriptors: Elementary School Students, Computer Security, Educational Trends, Computer Science Education
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment
Jermaine Jewel Jean-Pierre – ProQuest LLC, 2021
The frequency of cyberattacks against governments has increased at an alarming rate and the lack of user awareness and knowledge of cybersecurity has been considered a contributing factor to the increase in cyberattacks and cyberthreats. The purpose of this quantitative experimental study was to explore the role and effectiveness of employee…
Descriptors: Knowledge Level, Computer Security, Training, Foreign Countries
Hajar Majjate; Youssra Bellarhmouch; Adil Jeghal; Ali Yahyaouy; Hamid Tairi; Khalid Alaoui Zidani – Education and Information Technologies, 2025
In recent times, there has been a growing interest in enhancing recommendation systems for e-learning platforms to deliver a personalised learning experience that meets each learner's distinct requirements and preferences. Nevertheless, it is crucial to recognise the ethical considerations surrounding this technology, as it heavily relies on…
Descriptors: Ethics, Artificial Intelligence, Technology Uses in Education, Student Attitudes
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Canfield, Casey Inez; Fischhoff, Baruch; Davis, Alex – Metacognition and Learning, 2019
Every electronic message poses some threat of being a phishing attack. If recipients underestimate that threat, they expose themselves, and those connected to them, to identity theft, ransom, malware, or worse. If recipients overestimate that threat, then they incur needless costs, perhaps reducing their willingness and ability to respond over…
Descriptors: Deception, Electronic Mail, Metacognition, Self Esteem