Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 10 |
Descriptor
Source
ProQuest LLC | 7 |
Association Supporting… | 1 |
E-Learning | 1 |
Information Science Reference | 1 |
Quarterly Journal of Speech | 1 |
Author
Edwards, Gregory | 1 |
Hackney, Dennis W. G. | 1 |
Hare, Karen | 1 |
Hartnett, Stephen John | 1 |
II Patrick Michael Damon | 1 |
James Johnston | 1 |
Kim, Philip | 1 |
McAlpine, Mhairi | 1 |
Ng, Eugenia M. W., Ed. | 1 |
Warfield, Douglas L. | 1 |
Publication Type
Dissertations/Theses -… | 7 |
Journal Articles | 2 |
Reports - Evaluative | 2 |
Books | 1 |
Collected Works - General | 1 |
Collected Works - Proceedings | 1 |
Reports - Descriptive | 1 |
Education Level
Adult Education | 11 |
Higher Education | 3 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Audience
Practitioners | 1 |
Researchers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
II Patrick Michael Damon – ProQuest LLC, 2023
The purpose of this study was to examine the effects of gamified training in cybersecurity concepts on individuals not employed in information technology roles compared to traditional pieces of training. As the world becomes increasingly connected technologically, so too do the cyber vulnerabilities increase, and it is essential for all types of…
Descriptors: Information Technology, Information Security, Computer Security, Gamification
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Hackney, Dennis W. G. – ProQuest LLC, 2011
Subchapter III of Chapter 35 of Title 44, United States Code, Federal Information Security Management Act of 2002; Department of Defense (DoD) Directive 8500.01E, Information Assurance, October 24, 2002; DoD Directive 8100.1, Global Information Grid Overarching Policy, September 19, 2002; and DoD Instruction 8500.2, Information Assurance…
Descriptors: Computer Security, Risk Management, Information Systems, Information Technology
Warfield, Douglas L. – ProQuest LLC, 2011
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Descriptors: Information Technology, Industry, Computer Security, Governance
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Kim, Philip – ProQuest LLC, 2010
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
Descriptors: Financial Services, Knowledge Level, Transfer of Training, Computer Security
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Hare, Karen – ProQuest LLC, 2008
Implementation of information systems has lagged in many areas of clinical healthcare for a variety of reasons. Economics, data complexity and resistance are among the often quoted roadblocks. Research suggests that physicians play a major part in the adoption, use and diffusion of information technology (IT) in clinical settings. There are also…
Descriptors: Information Needs, Physicians, Information Systems, Information Technology
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
McAlpine, Mhairi – E-Learning, 2005
As awarding bodies modernise their procedures and incorporate elements of e-assessment into their qualifications, e-portfolios are emerging as a popular method of allowing candidates to display their abilities. All major United Kingdom awarding bodies now accept evidence from e-portfolio products for at least some of their qualifications. Although…
Descriptors: Portfolios (Background Materials), Foreign Countries, Student Certification, Portfolio Assessment