Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 13 |
Descriptor
Computer Security | 13 |
Information Security | 13 |
Statistical Analysis | 13 |
Online Surveys | 4 |
Surveys | 4 |
Information Technology | 3 |
Internet | 3 |
Knowledge Level | 3 |
Risk | 3 |
Administrators | 2 |
Computer Networks | 2 |
More ▼ |
Source
ProQuest LLC | 9 |
IEEE Transactions on Education | 1 |
Information Research: An… | 1 |
Journal of Digital Learning… | 1 |
Online Submission | 1 |
Author
Publication Type
Dissertations/Theses -… | 9 |
Journal Articles | 4 |
Reports - Research | 3 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Secondary Education | 1 |
Audience
Location
District of Columbia | 1 |
Turkey | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alexander, Rodney T. – ProQuest LLC, 2017
Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…
Descriptors: Information Security, Statistical Analysis, Computers, Computer Security
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Yilmaz, Ramazan; Karaoglan Yilmaz, F. Gizem; Özturk, H. Tugba; Karademir, Tugra – Online Submission, 2017
Information and Communication Technologies (ICT) have been rapidly prevailed among the children and youths. Personal technologies facilitating the students to gain some learning experiences both in and out of the schools also include many threats. It is important for students to have high awareness of safe internet and computer use to overcome…
Descriptors: Foreign Countries, Secondary School Students, Computer Use, Internet
Hamman, Seth T.; Hopkinson, Kenneth M.; Markham, Ruth L.; Chaplik, Andrew M.; Metzler, Gabrielle E. – IEEE Transactions on Education, 2017
The ability to anticipate the strategic actions of hackers, including where, when, and how they might attack, and their tactics for evading detection, is a valuable skill for cybersecurity. Therefore, developing the strategic reasoning abilities of cybersecurity students is an important cybersecurity education learning objective. This paper…
Descriptors: Game Theory, Information Security, Computer Science Education, Undergraduate Students
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence
Smith, Catherine L. – Information Research: An International Electronic Journal, 2016
Introduction: The analysis of detailed interaction records is fundamental to development of user-centred systems. Researchers seeking such data must recruit volunteers willing to allow tracking of their interactions. This study examines privacy and trust attitudes in the intent to volunteer for research requiring installation of tracking software.…
Descriptors: Privacy, Trust (Psychology), Data Analysis, Information Security
Daniels, Daniel B., III – ProQuest LLC, 2014
There is a lack of literature linking end-user behavior to the availability of open-source intelligence (OSINT). Most OSINT literature has been focused on the use and assessment of open-source intelligence, not the proliferation of personally or organizationally identifiable information (PII/OII). Additionally, information security studies have…
Descriptors: Information Security, Open Source Technology, Information Management, Computer Security
Walton, Marquetta – ProQuest LLC, 2016
The effectiveness of U.S. cyber-capabilities can have a serious effect on the cyber-security stance of the US and significantly impact how well U.S. critical infrastructures are protected. The problem is that the state of the U.S. cyber-security could be negatively impacted by the dependency that the US displays in its use of defensive…
Descriptors: Technological Literacy, Computer Security, Information Security, Qualitative Research
Balogun, Shereef Adewale – ProQuest LLC, 2013
Information technology (IT) outsourcing is a practical way to transfer information technology by industries of different firms. The problem occurs when companies outsource services to domestic and international data centers as network security issues arise. This leads to competition between companies causing the size of the company to become more…
Descriptors: Outsourcing, Information Technology, Risk, Organization Size (Groups)
Spears, Phillip Dewitt – ProQuest LLC, 2013
New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…
Descriptors: Information Security, Administrators, Educational Attainment, Organization Size (Groups)
Bennett, Jeannine B. – ProQuest LLC, 2012
This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…
Descriptors: Information Technology, Information Security, Change Strategies, Online Surveys
Pusey, Portia; Sadera, William A. – Journal of Digital Learning in Teacher Education, 2012
In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related and Internet-capable technologies into instructional settings to improve student learning. Many presume that preservice teachers have the knowledge to competently model and teach issues of safety when working with these devices as…
Descriptors: Preservice Teacher Education, Preservice Teachers, Standards, Laws