Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 8 |
Descriptor
| Computer Security | 8 |
| Hypothesis Testing | 8 |
| Internet | 4 |
| Questionnaires | 4 |
| Foreign Countries | 3 |
| Self Efficacy | 3 |
| Case Studies | 2 |
| College Students | 2 |
| Comparative Analysis | 2 |
| Correlation | 2 |
| Costs | 2 |
| More ▼ | |
Source
| ProQuest LLC | 3 |
| Behaviour & Information… | 1 |
| Education for Information | 1 |
| Interdisciplinary Journal of… | 1 |
| International Educational… | 1 |
| Journal of Information… | 1 |
Author
| Barton, Irving Gary, Jr. | 1 |
| Choi, Min Suk | 1 |
| Gafni, Ruti | 1 |
| Hwang, Jae-Won | 1 |
| Kim, Rosemary | 1 |
| Larose, Robert | 1 |
| Lederer, Karen | 1 |
| Lee, Doohwang | 1 |
| Mavrikis, Manolis, Ed. | 1 |
| McLaren, Bruce M., Ed. | 1 |
| Mutula, Stephen M. | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 4 |
| Dissertations/Theses -… | 3 |
| Tests/Questionnaires | 2 |
| Collected Works - Proceedings | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Secondary Education | 2 |
| Elementary Education | 1 |
| Grade 6 | 1 |
| High Schools | 1 |
| Intermediate Grades | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
Audience
Location
| Finland | 1 |
| Florida | 1 |
| France | 1 |
| Kenya | 1 |
| South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
What Works Clearinghouse Rating
Barton, Irving Gary, Jr. – ProQuest LLC, 2017
Military education is held to high standards for our servicemen and women. The purpose of this quantitative, comparative study was to determine if significant differences existed in learning styles relative to military experience as determined by learning in a serious game environment. Study results are expected to advance the state of research in…
Descriptors: Educational Games, Evaluation Methods, Military Training, Comparative Analysis
Gafni, Ruti; Nagar, Idan – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2016
CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…
Descriptors: Program Effectiveness, Learning Disabilities, Questionnaires, Problem Solving
Lederer, Karen – ProQuest LLC, 2012
The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…
Descriptors: Small Businesses, Technology Integration, Computer Networks, Information Technology
Choi, Min Suk – ProQuest LLC, 2013
Cybersecurity threats and vulnerabilities are causing substantial financial losses for governments and organizations all over the world. Cybersecurity criminals are stealing more than one billion dollars from banks every year by exploiting vulnerabilities caused by bank users' computer misuse. Cybersecurity breaches are threatening the common…
Descriptors: Public Agencies, Computer Security, Self Efficacy, Computer Use
Nyagowa, Hesbon O.; Ocholla, Dennis N.; Mutula, Stephen M. – Education for Information, 2013
This study was conducted to determine the effect of a set of dimensions on e-School success in a cross-sectional study of NEPAD's e-School pilot in Kenya. All of the six e-Schools participating in the NEPAD's e-School pilot in Kenya were selected. The study used survey methodology. Students and teachers in those schools formed the study…
Descriptors: Computer Security, Foreign Countries, User Satisfaction (Information), Pilot Projects
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Lee, Doohwang; Larose, Robert; Rifon, Nora – Behaviour & Information Technology, 2008
The objective of this study is to develop and test a model of online protection behaviour, particularly regarding the use of virus protection. Hypotheses are proposed concerning the predictors of the intention to engage in virus protection behaviour. Using a survey of 273 college students who use the Internet, a test of the hypotheses is conducted…
Descriptors: Self Efficacy, Intention, Computer Security, Multiple Regression Analysis
Stamper, John, Ed.; Pardos, Zachary, Ed.; Mavrikis, Manolis, Ed.; McLaren, Bruce M., Ed. – International Educational Data Mining Society, 2014
The 7th International Conference on Education Data Mining held on July 4th-7th, 2014, at the Institute of Education, London, UK is the leading international forum for high-quality research that mines large data sets in order to answer educational research questions that shed light on the learning process. These data sets may come from the traces…
Descriptors: Information Retrieval, Data Processing, Data Analysis, Data Collection

Direct link
Peer reviewed
