Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Information Security | 3 |
Policy Formation | 3 |
Compliance (Legal) | 2 |
Foreign Countries | 2 |
Professional Personnel | 2 |
Best Practices | 1 |
Case Studies | 1 |
College Administration | 1 |
Crime | 1 |
Developing Nations | 1 |
More ▼ |
Source
ProQuest LLC | 2 |
Cogent Education | 1 |
Author
Abdulfattah Omar | 1 |
Newmeyer, Kevin Patrick | 1 |
Stephen John Elliot | 1 |
Tahani Abdullah Abdurhman… | 1 |
Waheed M. A. Altohami | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Jamaica | 1 |
Saudi Arabia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Tahani Abdullah Abdurhman Alhumud; Abdulfattah Omar; Waheed M. A. Altohami – Cogent Education, 2023
Cybersecurity systems are crucial for safeguarding information assets across various sectors, including government, military, and commercial domains. In Saudi Arabia, cybersecurity has gained significant importance within the national security strategy, resulting in substantial investments in technologies to protect information assets, combat…
Descriptors: Information Security, Computer Security, Universities, Total Quality Management
Newmeyer, Kevin Patrick – ProQuest LLC, 2014
Developing nations have been slow to develop and implement cybersecurity strategies despite a growing threat to governance and public security arising from an increased dependency on Internet-connected systems in the developing world and rising cybercrime. Using a neorealist theoretical framework that draws from Gilpin and Waltz, this qualitative…
Descriptors: Foreign Countries, Developing Nations, Computer Security, Information Security