Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Industry | 4 |
Information Technology | 4 |
Foreign Countries | 2 |
Governance | 2 |
Information Security | 2 |
Administrative Organization | 1 |
Armed Forces | 1 |
COVID-19 | 1 |
Classroom Environment | 1 |
Competition | 1 |
More ▼ |
Author
Battisti, F. | 1 |
Boato, G. | 1 |
Brooks, D. Christopher | 1 |
Carli, M. | 1 |
Grant, Robert Luther | 1 |
Kelly, Brian | 1 |
McCormack, Mark | 1 |
Neri, A. | 1 |
O'Brien, John | 1 |
Reeves, Jamie | 1 |
Warfield, Douglas L. | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 2 |
Reports - Research | 2 |
Journal Articles | 1 |
Education Level
Higher Education | 2 |
Adult Education | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kelly, Brian; McCormack, Mark; Reeves, Jamie; Brooks, D. Christopher; O'Brien, John – EDUCAUSE, 2021
In 2021, EDUCAUSE is publishing a second edition of the "Horizon Report." With this inaugural issue of the Information Security edition of the "Horizon Report," EDUCAUSE has sought to expand their series of Teaching and Learning "Horizon Reports" to focus on a new area of critical importance to the future of higher…
Descriptors: Information Security, Higher Education, Educational Trends, COVID-19
Grant, Robert Luther – ProQuest LLC, 2017
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Descriptors: Information Security, Organizational Culture, Employees, Training
Warfield, Douglas L. – ProQuest LLC, 2011
The evolution of information technology has included new methodologies that use information technology to control and manage various industries and government activities. Information Technology has also evolved as its own industry with global networks of interconnectivity, such as the Internet, and frameworks, models, and methodologies to control…
Descriptors: Information Technology, Industry, Computer Security, Governance
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications