Publication Date
In 2025 | 3 |
Since 2024 | 7 |
Descriptor
Source
Journal of Cybersecurity… | 2 |
Journal of Information… | 2 |
British Journal of… | 1 |
Journal of Information… | 1 |
ProQuest LLC | 1 |
Author
A. Renee Staton | 1 |
Ahadi Haji Mohd Nasir | 1 |
Amy J. Connolly | 1 |
Bernard Ngalim | 1 |
Daniel E. Rush | 1 |
Daniel L. Segal | 1 |
David Kocsis | 1 |
Ely Salwana | 1 |
Javier Hoz-Ruiz | 1 |
Jelena Jovanovic | 1 |
Leigh A. Mutchler | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 3 |
Reports - Research | 3 |
Dissertations/Theses -… | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Teachers | 1 |
Location
Cameroon | 1 |
Colorado (Colorado Springs) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Ahadi Haji Mohd Nasir; Ely Salwana; Mohammad Nazir Ahmad – Journal of Information Technology Education: Innovations in Practice, 2025
Aim/Purpose: This paper addresses the lack of a standardized approach to information dashboard design and the absence of integrated Information Governance (IG) principles in this context. Background: This study addresses the critical role of IG principles in ensuring dashboards are reliable, secure, and effective. By integrating IG principles into…
Descriptors: Information Management, Information Policy, Information Dissemination, Information Systems
Leigh A. Mutchler; Amy J. Connolly; Daniel E. Rush – Journal of Information Systems Education, 2024
Information systems courses must adapt to meet the unprecedented demand for well-trained information security (InfoSec) professionals, but they cannot competently fill this gap without also ensuring that students are fluent and confident in foundational skills, both technical and behavioral. How to teach behavioral topics in InfoSec management is…
Descriptors: Information Security, Information Science Education, Information Systems, Technological Literacy