Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
Author
| Huang, Nan-Ching | 1 |
| Huang, Tien-Chuan | 1 |
| Keh, Huan-Chao | 1 |
| Kim, Philip | 1 |
| Shaw, Ruey-Shiang | 1 |
| Tabor, Sharon W. | 1 |
Publication Type
| Journal Articles | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Adult Education | 2 |
| Higher Education | 1 |
Audience
Location
| Idaho | 1 |
| Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Shaw, Ruey-Shiang; Keh, Huan-Chao; Huang, Nan-Ching; Huang, Tien-Chuan – International Journal of Distance Education Technologies, 2011
Information Security Awareness, though known as a primary and important issue in the domain of Information Security, CSI computer crime and security survey showed poor security awareness training in public and private sectors. In many studies, the authors have found that the usage of knowledge maps helps the process of learning and conception…
Descriptors: Electronic Learning, Concept Mapping, Learning Processes, Computer Security
Kim, Philip – ProQuest LLC, 2010
Financial institutions are increasingly finding difficulty defending against information security risks and threats, as they are often the number one target for information thieves. An effective information security training and awareness program can be a critical component of protecting an organization's information assets. Many financial…
Descriptors: Financial Services, Knowledge Level, Transfer of Training, Computer Security
Tabor, Sharon W. – Quarterly Review of Distance Education, 2007
Distance education has become an expectation with students who have grown up with technology as well as nontraditional and working students. Most universities now offer a wide range of online courses and degree programs to meet these needs. Online delivery of technology courses, however, has been problematic when the course includes very complex…
Descriptors: Distance Education, Online Courses, Computer Security, Information Science Education

Peer reviewed
Direct link
