Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Information Technology | 5 |
Simulation | 5 |
Internet | 3 |
Models | 3 |
Benchmarking | 2 |
Computer Science Education | 2 |
Computer Software | 2 |
Data Processing | 2 |
Design | 2 |
Educational Games | 2 |
More ▼ |
Author
Abu Alam | 1 |
Alex Cameron | 1 |
Baijian Yang | 1 |
Dixit, R. K. | 1 |
Gersch, Joseph E. | 1 |
Gihan J. Mendis | 1 |
Isias, Pedro, Ed. | 1 |
Issa, Theodora, Ed. | 1 |
Issa, Tomayess, Ed. | 1 |
Jin Wei-Kocsis | 1 |
Jordan Allison | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
India | 1 |
Poland | 1 |
Russia | 1 |
Saudi Arabia | 1 |
South Africa | 1 |
Ukraine | 1 |
United Kingdom (England) | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Jin Wei-Kocsis; Moein Sabounchi; Gihan J. Mendis; Praveen Fernando; Baijian Yang; Tonglin Zhang – IEEE Transactions on Education, 2024
Contribution: A novel proactive and collaborative learning paradigm was proposed to engage learners with different backgrounds and enable effective retention and transfer of the multidisciplinary artificial intelligence (AI)-cybersecurity knowledge. Specifically, the proposed learning paradigm contains: 1) an immersive learning environment to…
Descriptors: Computer Security, Artificial Intelligence, Interdisciplinary Approach, Models
Gersch, Joseph E. – ProQuest LLC, 2013
The Border Gateway Protocol (BGP) is critical to the global internet infrastructure. Unfortunately BGP routing was designed with limited regard for security. As a result, IP route hijacking has been observed for more than 16 years. Well known incidents include a 2008 hijack of YouTube, loss of connectivity for Australia in February 2012, and an…
Descriptors: Computer Security, Internet, Information Technology, Simulation
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology