Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 9 |
Since 2016 (last 10 years) | 15 |
Since 2006 (last 20 years) | 18 |
Descriptor
Information Security | 18 |
Information Technology | 18 |
Knowledge Level | 18 |
Computer Security | 9 |
Correlation | 5 |
Foreign Countries | 5 |
Technological Literacy | 5 |
Computer Mediated… | 4 |
Internet | 4 |
Professional Personnel | 4 |
Safety | 4 |
More ▼ |
Source
ProQuest LLC | 8 |
Journal of Information… | 2 |
Online Submission | 2 |
Education & Training | 1 |
Education and Information… | 1 |
Educational Media… | 1 |
Journal of Education and… | 1 |
Journal of Information… | 1 |
SAGE Open | 1 |
Author
Publication Type
Journal Articles | 10 |
Reports - Research | 10 |
Dissertations/Theses -… | 8 |
Education Level
Postsecondary Education | 7 |
Higher Education | 6 |
Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Audience
Location
Hong Kong | 2 |
Appalachia | 1 |
Bangladesh (Dhaka) | 1 |
Colorado | 1 |
Michigan | 1 |
Ohio | 1 |
Philippines | 1 |
Tennessee | 1 |
Thailand | 1 |
Turkey (Ankara) | 1 |
Vietnam | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Kwun Hung Li; Dickson K.W. Chiu; Elaine W.S. Kong; Kevin K.W. Ho – Education & Training, 2025
Purpose: This research investigates mobile security awareness among university students in Hong Kong, who increasingly rely on mobile devices for their daily activities and academic needs. This research seeks to inform targeted educational strategies and policies to enhance mobile security practices among young adults, particularly in regions…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, College Students
Gümüs, Muhammed Murat; Çakir, Recep; Korkmaz, Özgen – Education and Information Technologies, 2023
Today, with digital technologies being in every aspect of our lives, cyberbullying and digital ethics, and digital security violations are emerging as concepts that threaten our digital world. It is thought that displaying ethical behavior and providing digital security in digital environments can increase sensitivity to cyberbullying. Here, it is…
Descriptors: Preservice Teachers, Bullying, Computer Mediated Communication, Ethics
Lee, Heesuk – ProQuest LLC, 2022
Many organizations are providing employee training to raise security awareness as data breaches increase. Organizational digital transformation has accelerated, especially during the COVID-19 outbreak. It has made the technology industry a prime target for cyberattacks. Although more organizations invest in cybersecurity training, data breaches…
Descriptors: Information Technology, Information Security, Employee Attitudes, Knowledge Level
Bulbul Ahamed; Mohammad Rashed Hasan Polas; Ahmed Imran Kabir; Abu Saleh Md. Sohel-Uz-Zaman; Abdullah Al Fahad; Saima Chowdhury; Mrittika Rani Dey – SAGE Open, 2024
The purpose of the study is to examine how cybersecurity knowledge, password security, and self-perception of skill affect cybersecurity awareness issues via the mediating lens of cybersecurity attitude among university students in Bangladesh. A sample of 430 university students from two public and three private universities provided the data in…
Descriptors: Student Empowerment, Information Security, Knowledge Level, College Students
Joshua Montgomery – ProQuest LLC, 2021
The problem that was investigated is if the level of cybersecurity knowledge held by technology leaders at Appalachian Ohio schools is placing those schools at risk for exploitation. The research method selected for this study was a quantitative study with a correlational research design. The study looked at two key factors in this relationship,…
Descriptors: Computer Security, Information Security, Security Personnel, Information Technology
Cummings, Jeff; Janicki, Thomas; Matthews, Kevin – Journal of Information Systems Education, 2023
Faculty in the information systems (IS) and information technology (IT) fields are faced with the challenge to keep their curriculum relevant and current. What was taught two years ago will often be outdated and faculty must constantly update their curriculum on which courses should be taught as well as what should be taught within a particular…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Hero, Jesson L.; Zulueta, Ma. Cristina E.; Gloria, Daianne S.; Tongol, Jose Carlo L.; Dela Cruz, Aaron C.; Sagun, Angelita T.; Cajurao, Gil V.; Cabrera, Wendell C. – Online Submission, 2021
In the advent of Information and Communications Technology in education, competence and skills for technology-based instruction are essential for teachers. With this, there is a need to continually train and equip teachers with understanding and capabilities that will enable them to maximize the utilization of ICT in their instructional practices.…
Descriptors: Educational Innovation, Technology Integration, Technological Literacy, Information Literacy
Cummings, Jeff; Janicki, Thomas – Journal of Information Systems Education, 2021
In the fields of information technology and information systems, faculty must consistently adjust the curriculum to meet the demands of the field. However, a challenge they often face is understanding what should be covered, especially given the limited number of courses most universities are able to offer. This research is a biennial report of…
Descriptors: Computer Science Education, Information Technology, Information Systems, Job Skills
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Kassa, Woldeloul – ProQuest LLC, 2016
Information technology (IT) security threats and vulnerabilities have become a major concern for organizations in the United States. However, there has been little research on assessing the effect of IT security professionals' knowledge on the use of IT security controls. This study examined the unified theory of acceptance and use of technology…
Descriptors: Information Technology, Information Security, Professional Personnel, Knowledge Level
Reddy, Dinesh Sampangirama – ProQuest LLC, 2017
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Descriptors: Computer Security, Information Security, Information Technology, Self Efficacy
Ng, Wing Shui – Journal of Information Technology Education: Research, 2020
Aim/Purpose: Teachers usually educate students' cyberethics using debate, case-based discussion, and role-playing instructional methods in a face-to-face setting. With the presence of teacher and peers, students may not be willing to share their true attitudes, and it may affect the effectiveness of the teaching methods. To tackle the challenge,…
Descriptors: Ethics, Teaching Methods, Instructional Effectiveness, Self Evaluation (Individuals)
Martin, Florence; Gezer, Tuba; Anderson, Jimmeka; Polly, Drew; Wang, WeiChao – Educational Media International, 2021
Children are exposed to digital devices at an early age. This study examines parents' perception of student digital safety on technology use, time spent, parent concerns and knowledge on various digital safety topics. Through a survey-based study, we analyzed data collected from 113 parents. Parents mentioned that their kids use Internet via…
Descriptors: Parent Attitudes, Child Safety, Internet, Handheld Devices
Hauser, Deanna Mae – ProQuest LLC, 2017
Social engineers manipulate individuals into divulging confidential information or compromising personal or organizational security. The purpose of this qualitative case study was to examine the potential lack of social engineering awareness that affects employees at companies in southeastern Michigan. The research method consisted of interviews…
Descriptors: Engineering, Behavior Modification, Familiarity, College Faculty
Alqahtani, Abdullah; Alqahtani, Fatimah; Alqurashi, Mohammed – Journal of Education and Practice, 2017
Digital technologies have revolutionized the way people acquire information and gain new knowledge. With a click or touch on the screen, anybody who is online can sail in the digital world and accomplish many things. As such, the optimal use of information and communication technology involves user comprehension, knowledge, and awareness of…
Descriptors: Foreign Students, Citizenship, College Students, Information Technology
Previous Page | Next Page »
Pages: 1 | 2