NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Oliver J. Mason; Siobhan Collman; Stella Kazamia; Ioana Boureanu – Journal of Cybersecurity Education, Research and Practice, 2024
This pilot study aims to assess the acceptability of Open University's training platform called Gamified Intelligent Cyber Aptitude and Skills Training course (GICAST), as a means of improving cybersecurity knowledge, attitudes, and behaviours in undergraduate students using both quantitative and qualitative methods. A mixed-methods, pre-post…
Descriptors: Career Readiness, Computer Science, Computer Security, Gamification
Gourova, Elissaveta; Burgelman, Jean-Claude; Bogdanowicz, Marc; Herrmann, Christoph – 2002
Trends in the development and utilization of information and communication technologies (ICT) in the 13 candidate countries for admission into the European Union(the CC13) were examined by a 12-member panel of experts and its staff. The analysis focused on the following topics: (1) the communication infrastructure available in the CC13; (2) issues…
Descriptors: Access to Computers, Communications, Computer Security, Economic Change