NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Peer reviewed Peer reviewed
Direct linkDirect link
Workman, Michael D.; Luevanos, J. Anthony; Mai, Bin – IEEE Transactions on Education, 2022
Contribution: Based on a previous exploratory study, this research further investigated learning mode contributions from simulations and live competitive activities compared to a traditional classroom, laboratory, and testing approach to instruction in order to assess the applied behavioral contributions of each. Background: Cybersecurity…
Descriptors: Computer Security, Information Security, Computer Science Education, Simulation
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Becker, Benjamin; van Rijn, Peter; Molenaar, Dylan; Debeer, Dries – Assessment & Evaluation in Higher Education, 2022
A common approach to increase test security in higher educational high-stakes testing is the use of different test forms with identical items but different item orders. The effects of such varied item orders are relatively well studied, but findings have generally been mixed. When multiple test forms with different item orders are used, we argue…
Descriptors: Information Security, High Stakes Tests, Computer Security, Test Items
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology