Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 5 |
Since 2016 (last 10 years) | 11 |
Since 2006 (last 20 years) | 15 |
Descriptor
Information Security | 15 |
Information Technology | 15 |
Program Effectiveness | 15 |
Computer Security | 7 |
Foreign Countries | 5 |
Training | 5 |
Educational Legislation | 3 |
Federal Legislation | 3 |
Public Agencies | 3 |
Risk | 3 |
Audits (Verification) | 2 |
More ▼ |
Source
ProQuest LLC | 6 |
Office of Inspector General,… | 3 |
Journal of Media Literacy… | 2 |
Online Submission | 2 |
Clearing House: A Journal of… | 1 |
Education & Training | 1 |
Author
Publication Type
Reports - Research | 7 |
Dissertations/Theses -… | 6 |
Journal Articles | 6 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 3 |
Secondary Education | 3 |
High Schools | 2 |
Adult Education | 1 |
Early Childhood Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Primary Education | 1 |
Audience
Laws, Policies, & Programs
Every Student Succeeds Act… | 1 |
Stewart B McKinney Homeless… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Kwun Hung Li; Dickson K.W. Chiu; Elaine W.S. Kong; Kevin K.W. Ho – Education & Training, 2025
Purpose: This research investigates mobile security awareness among university students in Hong Kong, who increasingly rely on mobile devices for their daily activities and academic needs. This research seeks to inform targeted educational strategies and policies to enhance mobile security practices among young adults, particularly in regions…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, College Students
Mite Setiansah; Nuryanti Nuryanti; Edi Santoso; Agus Ganjar Runtiko; Wiwik Novianti – Journal of Media Literacy Education, 2023
Digital literacy education is essential for everyone, including seniors to sustain their quality of life. The Digital Academy for Seniors aims to instill digital skills among seniors through a non-formal learning program. This qualitative research aimed to provide a comprehensive description of how the program can develop digital resilience and…
Descriptors: Foreign Countries, Older Adults, Technological Literacy, Quality of Life
Jiow, Hee Jhee; Mwagwabi, Florence; Low-Lim, Anita – Journal of Media Literacy Education, 2021
This study adopts an experimental design to investigate the effectiveness of a password hygiene training programme. The password hygiene training programme adopted the Protection Motivation Theory's framework in its development, and was delivered online to 84 students aged 13 to 16. Strength of password measures, such as time taken, and number of…
Descriptors: Media Literacy, Information Security, Teaching Methods, Instructional Effectiveness
Arreerard, Woraphapa; Ruangsan, Niraj – Online Submission, 2021
The objectives of this research were: 1) to develop a model of promoting the potential of people in the digital field towards the development of digital villages (PDG) in Mahasarakham, Thailand; 2) to develop a course of promoting PDG in Mahasarakham and the learning multimedia; 3) to promote PDG in Mahasarakham; 4) to monitor and evaluate the…
Descriptors: Foreign Countries, Information Technology, Technology Integration, Economic Development
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Munn, Jamie E. – ProQuest LLC, 2017
Military leaders, both active duty and General Schedule (GS), must understand cyber warfare with its environmental connections and rapid evolution while finding ways to develop strategies that may lessen threats and attacks to government infrastructure. The Department of Defense (DoD) sought training and certification programs from the civilian…
Descriptors: Military Personnel, Information Security, Information Technology, Training
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Grant, Robert Luther – ProQuest LLC, 2017
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Descriptors: Information Security, Organizational Culture, Employees, Training
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Griffiths, Barry J. – Clearing House: A Journal of Educational Strategies, Issues and Ideas, 2015
For countries to remain competitive in the global economy, it is important to cultivate the next generation of native mathematicians. However, this goal has been increasingly challenging in the United States where, despite the tremendous increase in university enrollment during recent decades, the number of students studying mathematics has…
Descriptors: Summer Programs, Mathematics Education, Program Effectiveness, Academically Gifted
Office of Inspector General, US Department of Education, 2017
This Annual Plan presents the major initiatives and priorities the U.S. Department of Education (Department) Office of Inspector General (OIG) intends to undertake to assist the Department in fulfilling its responsibilities to America's taxpayers and students. The Department continues to face significant challenges in FY 2018 that impact its…
Descriptors: Public Agencies, Strategic Planning, Financial Audits, Compliance (Legal)
Cobb, William E. – ProQuest LLC, 2011
The information leakage of electronic devices, especially those used in cryptographic or other vital applications, represents a serious practical threat to secure systems. While physical implementation attacks have evolved rapidly over the last decade, relatively little work has been done to allow system designers to effectively counter the…
Descriptors: Identification, Program Effectiveness, Computer Security, Information Security
Koh, Byungwan – ProQuest LLC, 2011
The advent of information technology has enabled firms to collect significant amounts of data about individuals and mine the data for developing their strategies. Profiling of individuals is one common use of data collected about them. It refers to using known or inferred information to categorize the type of an individual and to tailor specific…
Descriptors: Screening Tests, Program Effectiveness, Information Technology, Data Collection
Yang, Yubao – ProQuest LLC, 2011
Information security breaches pose a significant and increasing threat to national security and economic well-being. In the Symantec Internet Security Threat Report (2003), companies surveyed experienced an average of about 30 attacks per week. Anecdotal evidence suggests that losses from cyber-attacks can run into millions of dollars. The CSI-FBI…
Descriptors: Information Security, Surveys, Information Technology, Economic Factors