Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 10 |
Since 2016 (last 10 years) | 22 |
Since 2006 (last 20 years) | 37 |
Descriptor
Information Security | 37 |
Risk | 37 |
Computer Security | 20 |
Information Technology | 16 |
Privacy | 10 |
Computer Software | 8 |
Knowledge Level | 8 |
Correlation | 7 |
Employees | 7 |
Risk Management | 7 |
Crime | 6 |
More ▼ |
Source
ProQuest LLC | 37 |
Author
Publication Type
Dissertations/Theses -… | 37 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Secondary Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Kindergarten | 1 |
Middle Schools | 1 |
Audience
Location
California | 1 |
European Union | 1 |
Illinois (Urbana) | 1 |
Minnesota (Minneapolis) | 1 |
Tennessee | 1 |
Texas (Dallas) | 1 |
United States | 1 |
Utah | 1 |
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Xuandong Zhao – ProQuest LLC, 2024
The rapid advancement of powerful Large Language Models (LLMs), such as ChatGPT and Llama, has revolutionized the world by bringing new creative possibilities and enhancing productivity. However, these advancements also pose significant challenges and risks, including the potential for misuse in the form of fake news, academic dishonesty,…
Descriptors: Computational Linguistics, Intellectual Property, Artificial Intelligence, Productivity
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Stacia Smith – ProQuest LLC, 2023
Moving from high school to college is a major life transition leading to significant changes across many aspects of daily life. This time frame is often seen as the transition from a youth to a young adult, yet its impact on technology use and cybersecurity vulnerabilities remains relatively unstudied. This study investigated which factors…
Descriptors: College Freshmen, Computer Security, Information Security, Internet
Makri-Werzen, Denise – ProQuest LLC, 2022
The 21st century has brought about an increase in the popularity of social media networking usage on a global level, especially among college students. Social connectivity has become a vital part of the daily lives of college students, providing connections with their educational, personal, and social lives. The purpose of this qualitative study…
Descriptors: Social Media, Social Networks, College Students, Student Attitudes
R. Ikuenobe Osolease – ProQuest LLC, 2021
The purpose of this study is to identify the best model that explains the relationship between conflicting risk structures and decision quality. Using confirmatory factor analysis and hierarchical regression techniques as statistical methods, the author confirmed that changes in the conflicting risk structures correlated with changes in decision…
Descriptors: Computer Security, Information Security, Risk Management, Risk
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Meraj Farheen Ansari – ProQuest LLC, 2021
Cybersecurity awareness training plays a vital role for organizations in guaranteeing resources' availability. Sufficient education regarding security awareness necessitates relating both the scope and importance of the training. This research determines the correlation between an employee's risk score and the effectiveness of AI-based security…
Descriptors: Employees, Risk, Scores, Artificial Intelligence
Campbell, Wendy – ProQuest LLC, 2017
The speed and availability of Internet-capable devices, such as computers, smartphones, gaming consoles, TVs, and tablets have made it possible for our society to be connected, and stay connected to the Internet 24 hours a day. The Internet of Things (IoT) describes a new environment where common objects are uniquely identifiable and accessible…
Descriptors: Internet, Information Technology, Information Security, Universities
Singletary, Tod J. – ProQuest LLC, 2017
The United States Military has become increasingly dependent upon technology to meet its mission objectives with a consequence being greater dependence on civilian defense contractors to provide specialized services in support of high-tech mission requirements. Modern military defense contractors have also become dependent upon reliable and secure…
Descriptors: Armed Forces, Information Security, Risk, Outsourcing
Fulton, Joel – ProQuest LLC, 2017
Bring your own device (BYOD) is the use of uncontrolled devices, which increases risks to business data and intellectual property. Like centralized and distributed computing adoption before it, the rapid proliferation of BYOD has outstripped security advances. The trend is growing due to the expectations of the Millennial workforce and its high…
Descriptors: Generational Differences, Ownership, Technological Literacy, Handheld Devices
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
McCune, T. John – ProQuest LLC, 2017
With privacy settings on social networking sites (SNS) perceived as complex and difficult to use and maintain, young adults can be left vulnerable to others accessing and using their personal information. Consequences of not regulating the boundaries their information on SNS include the ability for current and future employers to make…
Descriptors: Young Adults, Social Media, Social Networks, Privacy