Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 8 |
Employees | 8 |
Information Technology | 8 |
Information Security | 5 |
Risk | 3 |
Armed Forces | 2 |
Computer Mediated… | 2 |
Constructivism (Learning) | 2 |
Economic Development | 2 |
Grounded Theory | 2 |
Higher Education | 2 |
More ▼ |
Source
ProQuest LLC | 4 |
Community College Journal | 1 |
Journal on Educational… | 1 |
Online Submission | 1 |
Stylus Publishing LLC | 1 |
Author
Balogun, Shereef Adewale | 1 |
Bangert-Drowns, Robert | 1 |
Baykal, Adnan | 1 |
Berg, George | 1 |
Bloniarz, Peter | 1 |
Delio, Vince | 1 |
Gangolly, Jagdish | 1 |
Goel, Sanjay | 1 |
Grant, Robert Luther | 1 |
Hobbs, Jon | 1 |
Hoefling, Trina | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 4 |
Reports - Descriptive | 3 |
Books | 2 |
Journal Articles | 2 |
Collected Works - General | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Grant, Robert Luther – ProQuest LLC, 2017
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Descriptors: Information Security, Organizational Culture, Employees, Training
Hoefling, Trina – Stylus Publishing LLC, 2017
Remote working is the new reality, and transactional work--provided by freelancers, contract employees or consultants--has increased exponentially. It is forecast that as much as half the labor force will be working independently and virtually by 2020. Most organizations are still grappling with how to effectively manage their virtual staff and…
Descriptors: Technological Literacy, Teamwork, Computer Mediated Communication, Communications
Lawrence, A. S. Arul, Ed.; Thiyagarajan, P., Ed. – Online Submission, 2021
"Skill is laying the foundation for a brighter India. As John Ruskin puts it, "Skill is the unified force of experience, intellect, and passion in their operation." "Nation Building" is a herculean task that involves the government of the land, private and public institutions, industries, organisations, and every citizen…
Descriptors: Foreign Countries, Nationalism, Economic Development, Skill Development
Balogun, Shereef Adewale – ProQuest LLC, 2013
Information technology (IT) outsourcing is a practical way to transfer information technology by industries of different firms. The problem occurs when companies outsource services to domestic and international data centers as network security issues arise. This leads to competition between companies causing the size of the company to become more…
Descriptors: Outsourcing, Information Technology, Risk, Organization Size (Groups)
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Webb, James O., Jr. – ProQuest LLC, 2012
There is a perception that there are risks and benefits associated with the use of online social networking media within a military organization. This research study explored this perception by investigating how employees use social networking applications and their perceptions of the benefits they receive. The study also assessed the measures…
Descriptors: Grounded Theory, Risk, Social Networks, Computer Mediated Communication
Goel, Sanjay; Pon, Damira; Bloniarz, Peter; Bangert-Drowns, Robert; Berg, George; Delio, Vince; Iwan, Laura; Hurbanek, Thomas; Schuman, Sandoor P.; Gangolly, Jagdish; Baykal, Adnan; Hobbs, Jon – Journal on Educational Resources in Computing, 2006
A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted…
Descriptors: Feedback (Response), Curriculum Development, Hospitals, Computer Security