Publication Date
In 2025 | 2 |
Since 2024 | 9 |
Since 2021 (last 5 years) | 16 |
Since 2016 (last 10 years) | 17 |
Since 2006 (last 20 years) | 21 |
Descriptor
Computer Security | 22 |
Foreign Countries | 22 |
Universities | 22 |
Information Security | 13 |
College Students | 6 |
Information Technology | 6 |
Internet | 6 |
Higher Education | 4 |
Privacy | 4 |
Student Attitudes | 4 |
Technological Literacy | 4 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 19 |
Reports - Research | 15 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 3 |
Tests/Questionnaires | 2 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 21 |
Postsecondary Education | 21 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Secondary Education | 1 |
Audience
Location
Saudi Arabia | 3 |
Europe | 2 |
Nigeria | 2 |
Thailand | 2 |
Australia | 1 |
Bangladesh | 1 |
Bangladesh (Dhaka) | 1 |
Cameroon | 1 |
Italy | 1 |
Libya | 1 |
Lithuania | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Mancha J. Sekgololo – Journal of Cybersecurity Education, Research and Practice, 2024
This study examines cybersecurity awareness in universities by analyzing related research output across different disciplines at the University of Johannesburg. The diffusion of innovation theory is used in this study as a theoretical framework to explain how cybersecurity awareness diffuses across disciplines. The University of Johannesburg…
Descriptors: Foreign Countries, Universities, Electronic Libraries, Academic Libraries
Eric G. Pardiñan; Ricson M. Bondad; Jivulter C. Mangubat – Education and Information Technologies, 2025
Accreditation activities are critical for an institution pursuing excellent recognition. However, the segmented approach to records or document management employed for accreditation, which relies on paper-based records, has several flaws. Impediments such as misplacement, crumpling, termites, and other conditions that might result in damaged or…
Descriptors: Foreign Countries, Web Sites, Archives, Records (Forms)
Alakrimi, Mahmoud M. – Online Submission, 2022
The Documentation and Information Department of all Libyan universities is working on developing the university's website to suit all users with their different experiences and ways of interacting, so it is necessary to test the ease of use of these sites. That is why the researcher seeks to evaluate and compare his performance of these sites and…
Descriptors: Universities, Web Sites, Information Dissemination, Foreign Countries
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Livinus Obiora Nweke; Uchenna Franklin Okebanama; Gibson Uwaezuoke Mba – Discover Education, 2025
The integration of Internet of Things (IoT), Artificial Intelligence (AI), and cybersecurity presents new opportunities for innovation and entrepreneurship, yet traditional educational approaches often lack the interdisciplinary and applied focus required to develop these competencies. This study evaluates the impact of an experiential learning…
Descriptors: Entrepreneurship, Artificial Intelligence, Internet, Information Security
Bulbul Ahamed; Mohammad Rashed Hasan Polas; Ahmed Imran Kabir; Abu Saleh Md. Sohel-Uz-Zaman; Abdullah Al Fahad; Saima Chowdhury; Mrittika Rani Dey – SAGE Open, 2024
The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh. A sample of 430 university students from two public and three private universities provided the data in…
Descriptors: Student Empowerment, Information Security, Knowledge Level, College Students
Kim, Sang Soo – Interactive Learning Environments, 2023
As education is increasingly going online, propelled by the COVID-19 outbreak, how to build student engagement has become critically important, and it is, therefore, necessary to explore the motivators and barriers to student engagement comprehensively. Given the nature of an online learning environment, this study specifically focused on security…
Descriptors: Online Courses, Universities, COVID-19, Pandemics
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Tahani Abdullah Abdurhman Alhumud; Abdulfattah Omar; Waheed M. A. Altohami – Cogent Education, 2023
Cybersecurity systems are crucial for safeguarding information assets across various sectors, including government, military, and commercial domains. In Saudi Arabia, cybersecurity has gained significant importance within the national security strategy, resulting in substantial investments in technologies to protect information assets, combat…
Descriptors: Information Security, Computer Security, Universities, Total Quality Management
Almaiah, Mohammed Amin; Al-Khasawneh, Ahmad – Education and Information Technologies, 2020
The adoption of mobile cloud computing technology is still at an early stage of implementation in the university campus. This research aims to fill this gap by investigating the main factors that influence on the decision to adopt mobile cloud computing in the university campus. Therefore, this research proposes an integrated model, incorporating…
Descriptors: Information Storage, Handheld Devices, Computer Assisted Instruction, Technology Integration
David Seyi Akanbi – ProQuest LLC, 2024
The demand for university education exceeds the supply in Nigeria, as more than 70% of eligible applicants cannot get admission into Nigerian universities annually. With a current population of 206 million, the World Bank predicts the Nigerian population will surpass the United States to become the third-largest country in the world by 2050. If…
Descriptors: Higher Education, Online Courses, Universities, Supply and Demand
Evmorfia-Iro Bartzia; Michael Lodi; Marco Sbaraglia; Simon Modeste; Viviane Durand-Guerrier; Simone Martini – Informatics in Education, 2024
In this paper, we present an activity to introduce the idea of public-key cryptography and to make pre-service STEM teachers explore fundamental informatics and mathematical concepts and methods. We follow the Theory of Didactical Situations within the Didactical Engineering methodology (both widely used in mathematics education research) to…
Descriptors: Information Science Education, Mathematics Education, Problem Solving, Teaching Methods
Mongkonrat Chaiyadet; Pallop Piriyasurawong; Panita Wannapiroon – International Education Studies, 2024
The objective of this research is to develop and study the outcomes of developing the Ubiquitous Buddhism Learning Ecosystem for Proactive Buddhism Propagation for Digital Citizenship. The sample group used in the research consists of nine individuals selected through targeted sampling, comprising experts in the design and development of learning…
Descriptors: Buddhism, Models, Citizenship, Educational Philosophy
Previous Page | Next Page »
Pages: 1 | 2