NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 33 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Heinrich, Matthew; Gerhart, Natalie – Journal of Information Systems Education, 2023
Mobile devices are a constantly used item in a college student's life. Students depend on them for entertainment, academics, and socializing with their friends. While they continually use them, they perhaps do not understand the impact of their use on their privacy or that the devices can be used to track them and collect their personal…
Descriptors: Privacy, Handheld Devices, College Students, Student Attitudes
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Qinyi Liu; Ronas Shakya; Jelena Jovanovic; Mohammad Khalil; Javier Hoz-Ruiz – British Journal of Educational Technology, 2025
High-volume, high-quality and diverse datasets are crucial for advancing research in the education field. However, such datasets often contain sensitive information that poses significant privacy challenges. Traditional anonymisation techniques fail to meet the privacy standards required by regulations like GDPR, prompting the need for more robust…
Descriptors: Privacy, Data, Information Security, Compliance (Legal)
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Miriam Patrick – ProQuest LLC, 2022
This qualitative case study discussed the security training and awareness for iMiTs Art's cloud and information systems due to the digital transition to cloud computing capabilities and usage. The study was based on the technology acceptance of the TAM (Technology Acceptance Model) model, security training concepts of SETA (Security Education and…
Descriptors: Information Security, Information Systems, Information Management, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Ramezan, Christopher A. – Journal of Information Systems Education, 2023
While demand for cybersecurity professionals is high, the field is currently facing a workforce shortage and a skills gap. Thus, an examination of current cybersecurity position hiring requirements may be advantageous for helping to close the skills gap. This work examines the education, professional experience, industry certification, security…
Descriptors: Computer Security, Information Technology, Job Skills, Digital Literacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Asadi, Majid – Information Systems Education Journal, 2023
This case asks information systems analysts to assess the cybersecurity posture of a manufacturing company. The exercise works well as a group activity in an information systems course that addresses cybersecurity controls. The case introduces guidance from the National Institute of Standards and Technology, and learners develop work products…
Descriptors: Teaching Methods, Information Systems, Information Science Education, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Marquardson, Jim; Elnoshokaty, Ahmed – Information Systems Education Journal, 2020
People starting cybersecurity careers have three main avenues for achieving entry-level job qualifications: learning in-demand skills, earning industry certifications, and graduating with a college degree. Though people can pursue skills, certificates, and degrees together, financial and time constraints often make people focus their efforts to…
Descriptors: Information Security, Computer Security, Employment Opportunities, Employment Qualifications
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ramlo, Susan E.; Nicholas, John B. – Journal of Cybersecurity Education, Research and Practice, 2020
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study…
Descriptors: Student Attitudes, Information Security, Best Practices, Computer Security
Previous Page | Next Page ยป
Pages: 1  |  2  |  3