Publication Date
In 2025 | 1 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 13 |
Since 2006 (last 20 years) | 15 |
Descriptor
Information Security | 15 |
Information Technology | 15 |
Training | 15 |
Computer Security | 9 |
Program Effectiveness | 5 |
Foreign Countries | 4 |
Privacy | 4 |
Audits (Verification) | 3 |
Computer Software | 3 |
Prevention | 3 |
Surveys | 3 |
More ▼ |
Source
ProQuest LLC | 8 |
Office of Inspector General,… | 2 |
EDUCAUSE | 1 |
Education & Training | 1 |
Information Systems Education… | 1 |
OECD Publishing | 1 |
Professional and… | 1 |
Author
Dickson K.W. Chiu | 1 |
Elaine W.S. Kong | 1 |
Grant, Robert Luther | 1 |
Harteis, Christian, Ed. | 1 |
James Edwin Tippey Jr. | 1 |
Jamie Reeves | 1 |
Jenay Robert | 1 |
Kevin K.W. Ho | 1 |
Kwun Hung Li | 1 |
Mark McCormack | 1 |
Mawel, Maurice | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 8 |
Reports - Research | 5 |
Journal Articles | 2 |
Books | 1 |
Collected Works - General | 1 |
Guides - Non-Classroom | 1 |
Reports - General | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Adult Education | 1 |
Audience
Researchers | 2 |
Practitioners | 1 |
Location
Australia | 1 |
Belgium | 1 |
Bermuda | 1 |
Cameroon | 1 |
Canada | 1 |
Chile | 1 |
Czech Republic | 1 |
Denmark | 1 |
Finland | 1 |
Florida | 1 |
France | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
International Adult Literacy… | 1 |
What Works Clearinghouse Rating
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Kwun Hung Li; Dickson K.W. Chiu; Elaine W.S. Kong; Kevin K.W. Ho – Education & Training, 2025
Purpose: This research investigates mobile security awareness among university students in Hong Kong, who increasingly rely on mobile devices for their daily activities and academic needs. This research seeks to inform targeted educational strategies and policies to enhance mobile security practices among young adults, particularly in regions…
Descriptors: Foreign Countries, Telecommunications, Handheld Devices, College Students
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Jenay Robert; Nicole Muscanell; Nichole Arbino; Mark McCormack; Jamie Reeves – EDUCAUSE, 2024
This report profiles the trends and key technologies and practices shaping the future of cybersecurity and privacy, and envisions a number of scenarios for that future. It is based on the perspectives and expertise of a global panel of leaders from across the higher education landscape. These are, in many ways, tumultuous times. Global political…
Descriptors: Information Security, Computer Security, Privacy, Higher Education
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Van Rikxoord, Tina Marie – ProQuest LLC, 2018
The problem addressed in this study is tax noncompliance by U.S. taxpayers. Despite the best efforts of the IRS noncompliance consistently averages 17% annually, amounting to billions of dollars in lost revenue for the federal government. The IRS needs to find a cost-effective method of closing this gap. Because the IRS has identified taxpayer…
Descriptors: Trust (Psychology), Taxes, Phenomenology, Information Technology
Office of Inspector General, US Department of Education, 2021
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. In fiscal year (FY) 2020, the focus of the audit was solely on Departmental Systems. This year the focus…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Office of Inspector General, US Department of Education, 2020
The objective of this audit was to determine whether the U.S. Department of Education's (Department) overall information technology (IT) security programs and practices were effective as they relate to Federal information security requirements. To answer this objective, the Department's performance was rated in accordance with Fiscal Year (FY)…
Descriptors: Public Agencies, Federal Legislation, Educational Legislation, Information Security
Stark, Adam – ProQuest LLC, 2017
This case study research explored the cybersecurity systems and training and education of IT professionals at a member college of the Florida College System. Thematic analysis was utilized to analyze interview transcripts of 6 respondents. A more descriptive analysis was completed using the survey responses from 15 respondents. From this analysis…
Descriptors: Case Studies, Information Security, Computer Security, Information Technology
Munn, Jamie E. – ProQuest LLC, 2017
Military leaders, both active duty and General Schedule (GS), must understand cyber warfare with its environmental connections and rapid evolution while finding ways to develop strategies that may lessen threats and attacks to government infrastructure. The Department of Defense (DoD) sought training and certification programs from the civilian…
Descriptors: Military Personnel, Information Security, Information Technology, Training
Grant, Robert Luther – ProQuest LLC, 2017
Data breaches due to social engineering attacks and employee negligence are on the rise. The only known defense against social engineering attacks and employee negligence is information security awareness and training. However, implementation of awareness and training programs within organizations are lagging in priority. This research used the…
Descriptors: Information Security, Organizational Culture, Employees, Training
Harteis, Christian, Ed. – Professional and Practice-based Learning, 2018
This edited volume brings together researchers from various disciplines (i.e. education, psychology, sociology, economy, information technology, engineering) discussing elementary changes at workplaces occurring through digitalization, and reflecting on educational challenges for individuals, organizations, and society. The latest developments in…
Descriptors: Computer Use, Change, Work Environment, Information Technology
Smith, Gwendolynn T. – ProQuest LLC, 2012
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
Descriptors: Federal Government, Employees, Users (Information), Futures (of Society)
OECD Publishing, 2014
The Programme for International Assessment of Adult Competencies (PIAAC) will establish technical standards and guidelines to ensure that the survey design and implementation processes of PIAAC yield high-quality and internationally comparable data. This document provides a revised version of the technical standards and guidelines originally…
Descriptors: Adults, International Assessment, Adult Literacy, Competence