Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Software | 7 |
Information Security | 7 |
Program Effectiveness | 7 |
Privacy | 4 |
Computer Security | 3 |
Crime | 3 |
Models | 2 |
Risk | 2 |
Risk Management | 2 |
Surveys | 2 |
Training | 2 |
More ▼ |
Author
Alexandra Rysul'ova | 1 |
Brown, Brandon R. | 1 |
Cummings, Jeffrey | 1 |
Fong, Maria | 1 |
Giovanni Bryan Jamal McKinney | 1 |
Green, Julie | 1 |
Hopkins, Liza | 1 |
Janicki, Thomas | 1 |
Vetere, Frank | 1 |
Wadley, Greg | 1 |
Yang, Yubao | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 4 |
Reports - Research | 3 |
Journal Articles | 2 |
Speeches/Meeting Papers | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Kindergarten | 1 |
Audience
Location
Australia | 1 |
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alexandra Rysul'ova – NORDSCI, 2023
Virtual worlds, like Second Life, are transformative innovations in education. These immersive 3D environments offer teachers and students unique opportunities beyond traditional classrooms. They foster active learning, allowing students to interact, manipulate objects, and engage with diverse content. This multimodal approach accommodates various…
Descriptors: Information Security, Computer Simulation, Barriers, Teaching Methods
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Janicki, Thomas; Cummings, Jeffrey – Information Systems Education Journal, 2022
As the skills and competencies needed by Information Systems (IS) undergraduates continues to grow, various IS professional societies have developed recommendations which are updated on a periodic basis. These recommendations known as 'model curricula' are a guide for faculty and institutions to consider when developing or evaluating the…
Descriptors: Information Science Education, Information Systems, Computer Software, Undergraduate Students
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Hopkins, Liza; Wadley, Greg; Vetere, Frank; Fong, Maria; Green, Julie – Australian Journal of Education, 2014
Reduced school attendance is a recognised risk factor for poorer outcomes both educationally and across a wide range of social, economic and personal indicators throughout life. Children and young people with chronic health conditions often have poor or disrupted records of school attendance due to periods of hospitalisation and time spent…
Descriptors: Technology Integration, Hospitalized Children, Elementary School Students, At Risk Students
Yang, Yubao – ProQuest LLC, 2011
Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…
Descriptors: Information Security, Surveys, Information Technology, Economic Factors