Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 4 |
Descriptor
Confidentiality | 4 |
Information Security | 4 |
Knowledge Level | 4 |
Employees | 2 |
Foreign Countries | 2 |
Privacy | 2 |
Program Effectiveness | 2 |
Behavior | 1 |
Coding | 1 |
Cognitive Processes | 1 |
College Students | 1 |
More ▼ |
Author
Ahmed Al Zaidy | 1 |
Che Soh Said | 1 |
Haslina Hassan | 1 |
Mashitoh Hashim | 1 |
Okolo, Nkiru Benjamin | 1 |
Ramlah Mailok | 1 |
Sikolia, David Wafula | 1 |
Publication Type
Dissertations/Theses -… | 3 |
Journal Articles | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ramlah Mailok; Haslina Hassan; Che Soh Said; Mashitoh Hashim – International Journal on Social and Education Sciences, 2023
Over recent years, the sharing of personal data among students is uncontrolled, especially on the social media networks, resulting in widespread data intrusions that compromise their privacy and confidentiality. Against this backdrop, this study was conducted to identify the level of knowledge of personal data protection among students. This…
Descriptors: Information Security, Knowledge Level, Foreign Countries, Privacy
Ahmed Al Zaidy – ProQuest LLC, 2020
Academic institutions hold important information about students, faculty, and staff members. Hackers target academic institutions to access this information for criminal activities such as identity theft. This study was conducted to examine information confidentiality and cybersecurity in academic institutions. It targeted employees' training…
Descriptors: Confidentiality, Information Security, Computer Security, Employees
Okolo, Nkiru Benjamin – ProQuest LLC, 2016
Information systems of today face more potential security infringement than ever before. The regular susceptibility of data to breaches is a function of systems users' disinclination to follow appropriate security measures. A well-secured system maintains integrity, confidentiality, and availability, while providing appropriate and consistent…
Descriptors: Information Security, Foreign Countries, Confidentiality, Information Systems
Sikolia, David Wafula – ProQuest LLC, 2013
User non-compliance with information security policies in organizations due to negligence or ignorance is reported as a key data security problem for organizations. The violation of the confidentiality, integrity and availability of organizational data has led to losses in millions of dollars for organizations in terms of money and time spent…
Descriptors: Information Security, Employees, Confidentiality, Prediction