Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 3 |
Descriptor
Competition | 3 |
Computer Software | 3 |
Information Security | 3 |
Information Systems | 2 |
Business Administration | 1 |
Compliance (Legal) | 1 |
Content Analysis | 1 |
Course Content | 1 |
Data Analysis | 1 |
Data Collection | 1 |
Ethics | 1 |
More ▼ |
Author
Abrantes, Bruno F. | 1 |
Beuran, Razvan | 1 |
Green, Andrew | 1 |
Hasegawa, Shinobu | 1 |
Shinoda, Yoichi | 1 |
Tan, Yasuo | 1 |
Tan, Zheyu | 1 |
Tang, Dat | 1 |
Venkataraman, Anuradha | 1 |
Woszczynski, Amy B. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Tests/Questionnaires | 1 |
Education Level
High Schools | 1 |
Audience
Location
Denmark | 1 |
European Union | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Abrantes, Bruno F.; Venkataraman, Anuradha – International Journal of Learning and Change, 2022
Strategy theory recognises outer general environmental mutations in the legal landscape as compelling dynamic forces of business competition. Thus, the latest EU directive on data protection constitutes an uncharted event for testing organisational adaptability. This research aims to understand the impact of GDPR and the endeavours towards the…
Descriptors: Foreign Countries, Content Analysis, Generalization, Business Administration
Beuran, Razvan; Tang, Dat; Tan, Zheyu; Hasegawa, Shinobu; Tan, Yasuo; Shinoda, Yoichi – Education and Information Technologies, 2019
Cybersecurity education and training are being conducted on an ever-increasing scale, as most organizations need to improve their readiness in dealing with the more and more frequent cyberattacks. However, most systems used for such education and training purposes are built from scratch, are highly customized, and often proprietary. This is true…
Descriptors: Information Security, Teaching Methods, Management Systems, Information Systems
Woszczynski, Amy B.; Green, Andrew – Journal of Information Systems Education, 2017
Cyber defense competitions (CDCs) simulate a real-world environment where the competitors must protect the information assets of a fictional organization. These competitions are becoming popular at the high school and college levels, as well as in industry and governmental settings. However, there is little research to date on the learning…
Descriptors: Outcomes of Education, Competition, Information Systems, National Security