Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Crime | 5 |
Information Security | 3 |
Information Technology | 3 |
Computer Software | 2 |
Higher Education | 2 |
Public Agencies | 2 |
Access to Information | 1 |
Accountability | 1 |
At Risk Persons | 1 |
Attitude Measures | 1 |
More ▼ |
Source
British Educational Research… | 1 |
Contemporary Issues in… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Information… | 1 |
Office of Inspector General,… | 1 |
Author
Brooks, Rochelle | 1 |
Chou, Te-Shun | 1 |
Dhillon, Harpal S. | 1 |
Dhillon, Manpreet | 1 |
Hempenius, Nicholas | 1 |
Hentea, Mariana | 1 |
Hope, Andrew | 1 |
Publication Type
Reports - Evaluative | 5 |
Journal Articles | 4 |
Numerical/Quantitative Data | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Policymakers | 1 |
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Elementary and Secondary… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Hope, Andrew – British Educational Research Journal, 2006
Internet access has recently been introduced into over 30,000 schools in the UK. While web provision has been heralded by some as an educational panacea, it is also recognised that there are dangers inherent in school Internet use. Adopting the cultural risk perspective, drawing upon a social-cultural analysis of Internet regulation and utilising…
Descriptors: Foreign Countries, Internet, At Risk Persons, Pornography
Hentea, Mariana; Dhillon, Harpal S.; Dhillon, Manpreet – Journal of Information Technology Education, 2006
Despite a variety of Information Security Assurance (ISA) curricula and diverse educational models, universities often fail to provide their graduates with skills demanded by employers. There is a big discrepancy between the levels of skills expected by employers and those the graduates have after completing their studies. The authors compare the…
Descriptors: Models, Job Skills, Educational Objectives, Relevance (Education)