Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 19 |
Since 2016 (last 10 years) | 32 |
Since 2006 (last 20 years) | 34 |
Descriptor
Computer Security | 34 |
Information Security | 34 |
Training | 34 |
Information Technology | 9 |
Knowledge Level | 9 |
Employees | 8 |
Program Effectiveness | 7 |
Crime | 6 |
Prevention | 6 |
Privacy | 6 |
Risk | 6 |
More ▼ |
Source
Author
Publication Type
Dissertations/Theses -… | 23 |
Reports - Research | 7 |
Journal Articles | 6 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Elementary Secondary Education | 4 |
Secondary Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Kindergarten | 1 |
Middle Schools | 1 |
Audience
Administrators | 1 |
Support Staff | 1 |
Teachers | 1 |
Location
Texas | 3 |
Afghanistan | 1 |
California | 1 |
Cameroon | 1 |
Florida | 1 |
Germany | 1 |
India | 1 |
Iraq | 1 |
Italy | 1 |
Mexico | 1 |
Morocco | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Valdemar Švábenský; Jan Vykopal; Pavel Celeda; Ján Dovjak – Education and Information Technologies, 2024
Computer-supported learning technologies are essential for conducting hands-on cybersecurity training. These technologies create environments that emulate a realistic IT infrastructure for the training. Within the environment, training participants use various software tools to perform offensive or defensive actions. Usage of these tools generates…
Descriptors: Computer Security, Information Security, Training, Feedback (Response)
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Jamaine Mungo – ProQuest LLC, 2022
The purpose of this generic qualitative inquiry research study is to examine the features that need to be improved in self-paced cybersecurity awareness training to educate retail employees to identify phishing attacks. Malicious phishing attacks are a significant threat to retail corporations' business operations and confidential data. Employees'…
Descriptors: Computer Security, Information Security, Training, Employees
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
Juan Jaime Saldana II – ProQuest LLC, 2023
There is an ever-pressing need for cybersecurity awareness and implementation of learning strategies in the workplace to mitigate the increased threat posed by cyber-attacks and exacerbated by an untrained workforce. The lack of cybersecurity knowledge amongst government employees has increased to critical levels due to the amount of sensitive…
Descriptors: Information Security, Computer Security, Local Government, Government Employees
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Vykopal, Jan; Seda, Pavel; Svabensky, Valdemar; Celeda, Pavel – IEEE Transactions on Learning Technologies, 2023
Hands-on computing education requires a realistic learning environment that enables students to gain and deepen their skills. Available learning environments, including virtual and physical laboratories, provide students with real-world computer systems but rarely adapt the learning environment to individual students of various proficiency and…
Descriptors: Students, Educational Technology, Computer Assisted Instruction, Media Adaptation
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Jenay Robert; Nicole Muscanell; Nichole Arbino; Mark McCormack; Jamie Reeves – EDUCAUSE, 2024
This report profiles the trends and key technologies and practices shaping the future of cybersecurity and privacy, and envisions a number of scenarios for that future. It is based on the perspectives and expertise of a global panel of leaders from across the higher education landscape. These are, in many ways, tumultuous times. Global political…
Descriptors: Information Security, Computer Security, Privacy, Higher Education
Tan, Zheyu; Beuran, Razvan; Hasegawa, Shinobu; Jiang, Weiwei; Zhao, Min; Tan, Yasuo – Education and Information Technologies, 2020
Cybersecurity is no longer an issue discussed only between the professionals or technologists, but it is also closely related to ordinary people whose daily life is exposed to kinds of cyberattacks. And Womabat Security Technologies conducted a survey revealed that ransomware is an unknown concept to nearly two-thirds of employees. In practical,…
Descriptors: Computer Security, Information Security, Training, Computer Assisted Instruction
Švábenský, Valdemar; Vykopal, Jan; Celeda, Pavel; Tkácik, Kristián; Popovic, Daniel – Education and Information Technologies, 2022
Hands-on cybersecurity training allows students and professionals to practice various tools and improve their technical skills. The training occurs in an interactive learning environment that enables completing sophisticated tasks in full-fledged operating systems, networks, and applications. During the training, the learning environment allows…
Descriptors: Computer Security, Information Security, Training, Data Collection
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services