Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Software | 7 |
Information Security | 7 |
Training | 7 |
Computer Security | 5 |
Crime | 3 |
Foreign Countries | 3 |
Information Technology | 3 |
Privacy | 3 |
Computers | 2 |
Correlation | 2 |
Deception | 2 |
More ▼ |
Author
Brown, Brandon R. | 1 |
Estes, Aaron | 1 |
Giovanni Bryan Jamal McKinney | 1 |
Harteis, Christian, Ed. | 1 |
James Edwin Tippey Jr. | 1 |
Okoye, Stella Ifeyinwa | 1 |
Publication Type
Dissertations/Theses -… | 5 |
Books | 1 |
Collected Works - General | 1 |
Guides - Non-Classroom | 1 |
Reports - General | 1 |
Tests/Questionnaires | 1 |
Education Level
Adult Education | 1 |
Higher Education | 1 |
Kindergarten | 1 |
Postsecondary Education | 1 |
Audience
Researchers | 2 |
Practitioners | 1 |
Location
Australia | 1 |
Belgium | 1 |
Bermuda | 1 |
California | 1 |
Canada | 1 |
Chile | 1 |
Czech Republic | 1 |
Denmark | 1 |
Finland | 1 |
France | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Okoye, Stella Ifeyinwa – ProQuest LLC, 2017
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
Descriptors: Information Security, Foreign Countries, Business, Systems Approach
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Harteis, Christian, Ed. – Professional and Practice-based Learning, 2018
This edited volume brings together researchers from various disciplines (i.e. education, psychology, sociology, economy, information technology, engineering) discussing elementary changes at workplaces occurring through digitalization, and reflecting on educational challenges for individuals, organizations, and society. The latest developments in…
Descriptors: Computer Use, Change, Work Environment, Information Technology
OECD Publishing, 2014
The Programme for International Assessment of Adult Competencies (PIAAC) will establish technical standards and guidelines to ensure that the survey design and implementation processes of PIAAC yield high-quality and internationally comparable data. This document provides a revised version of the technical standards and guidelines originally…
Descriptors: Adults, International Assessment, Adult Literacy, Competence