Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 7 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 8 |
Crime | 8 |
Risk | 8 |
Information Security | 7 |
Correlation | 3 |
Deception | 3 |
Best Practices | 2 |
Compliance (Legal) | 2 |
Computer Software | 2 |
Electronic Mail | 2 |
Foreign Countries | 2 |
More ▼ |
Author
Bernard Ngalim | 1 |
Brown, Brandon R. | 1 |
Conley-Ware, Lakita D. | 1 |
Cooper, Paul K. | 1 |
Estes, Aaron | 1 |
James Johnston | 1 |
K., Thiyagu | 1 |
Laurel Lynn Schneider | 1 |
T., Santhosh | 1 |
Publication Type
Dissertations/Theses -… | 6 |
Journal Articles | 2 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Adult Education | 1 |
Kindergarten | 1 |
Audience
Location
California | 1 |
Cameroon | 1 |
India | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Cooper, Paul K. – ProQuest LLC, 2017
There has been a significant growth of portable devices capable of storing both personal data as well as sensitive organizational data. This growth of these portable devices has led to an increased threat of cyber-criminal activity. The purpose of this study was to gain a better understanding of security threats to the data assets of organizations…
Descriptors: Information Security, Crime, Computer Security, Risk
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Conley-Ware, Lakita D. – ProQuest LLC, 2010
This research addresses a real world cyberspace problem, where currently no cross industry standard methodology exists. The goal is to develop a model for identification and detection of vulnerabilities and threats of cyber-crime or cyber-terrorism where cyber-technology is the vehicle to commit the criminal or terrorist act (CVCT). This goal was…
Descriptors: Crime, Terrorism, Identification, Computer Security