Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Information Security | 3 |
Information Technology | 3 |
Risk | 2 |
Academic Persistence | 1 |
Addictive Behavior | 1 |
Administrative Organization | 1 |
Age Differences | 1 |
Armed Forces | 1 |
Artists | 1 |
Athletes | 1 |
More ▼ |
Source
ProQuest LLC | 2 |
Online Submission | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Books | 1 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Grade 1 | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Location
Tennessee | 3 |
Albania | 1 |
China | 1 |
Croatia | 1 |
Kentucky | 1 |
Morocco | 1 |
North Carolina | 1 |
Philippines | 1 |
Portugal | 1 |
Saudi Arabia | 1 |
Taiwan | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Grant, Robert Luther – ProQuest LLC, 2017
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Descriptors: Information Security, Organizational Culture, Employees, Training
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students
Chiwaraidzo Judith Nyabando – ProQuest LLC, 2008
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either protect or expose data at academic institutions to information security attacks. This study focused on computing practices at two academic institutions: East Tennessee State University and Milligan College. Interviews with six information…
Descriptors: Information Technology, Professional Personnel, School Personnel, College Faculty