Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 3 |
Crime | 3 |
Internet | 3 |
Computer Security | 2 |
Information Technology | 2 |
Algorithms | 1 |
Computer Science Education | 1 |
Computer Software | 1 |
Correlation | 1 |
Critical Thinking | 1 |
Data Analysis | 1 |
More ▼ |
Author
Abhishek Vaish | 1 |
Gomez-Pena, Guillermo | 1 |
Kpaduwa, Fidelis Iheanyi | 1 |
Lozano-Hemmer, Rafael | 1 |
Ravindra Kumar | 1 |
Samo Bobek | 1 |
Simona Sternad | 1 |
Publication Type
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Kpaduwa, Fidelis Iheanyi – ProQuest LLC, 2010
This current quantitative correlational research study evaluated the residential consumers' knowledge of wireless network security and its relationship with identity theft. Data analysis was based on a sample of 254 randomly selected students. All the study participants completed a survey questionnaire designed to measure their knowledge of…
Descriptors: Manufacturing Industry, Correlation, Telecommunications, Data Analysis

Lozano-Hemmer, Rafael; Gomez-Pena, Guillermo – Aztlan: A Journal of Chicano Studies, 2004
The leaked documents of the tech-illa network are investigated. It was unclear that if the information was left in the cracked server on purpose, to be distributed by the hackers as a decoy.
Descriptors: Internet, Computer Networks, Computer Security, Crime