NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mustafa Koc; Sema Golcukcu – International Society for Technology, Education, and Science, 2024
While there are many conveniences that the widespread use of the Internet provides us today, there are also some risks that come with these conveniences. One of these risks is the disclosure of personal data. Personal data can be defined as any information regarding an identified or identifiable real person. It can be argued that wide use of…
Descriptors: Preservice Teachers, Teacher Education Programs, Privacy, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Elgharnah, Khairi Ghet Elghadafi; Ozdamli, Fezile – World Journal on Educational Technology: Current Issues, 2020
Internet security safety awareness of parents is an important issue that should be addressed to raise the knowledge and awareness level about internet risks, information privacy, personal information, safety concerns and online attacks among parents to be able to teach their children to keep safe use on the internet. This study amid to investigate…
Descriptors: Internet, Safety, Parents, Knowledge Level
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Hauser, Deanna Mae – ProQuest LLC, 2017
Social engineers manipulate individuals into divulging confidential information or compromising personal or organizational security. The purpose of this qualitative case study was to examine the potential lack of social engineering awareness that affects employees at companies in southeastern Michigan. The research method consisted of interviews…
Descriptors: Engineering, Behavior Modification, Familiarity, College Faculty