Publication Date
In 2025 | 5 |
Since 2024 | 16 |
Since 2021 (last 5 years) | 44 |
Since 2016 (last 10 years) | 87 |
Since 2006 (last 20 years) | 113 |
Descriptor
Information Security | 113 |
Risk | 113 |
Computer Security | 47 |
Privacy | 39 |
Foreign Countries | 32 |
Internet | 32 |
Information Technology | 29 |
Knowledge Level | 21 |
Computer Software | 20 |
Student Attitudes | 20 |
Risk Management | 19 |
More ▼ |
Source
Author
Publication Type
Education Level
Audience
Policymakers | 2 |
Administrators | 1 |
Location
United States | 6 |
Australia | 4 |
China | 4 |
India | 4 |
Turkey | 4 |
United Kingdom | 4 |
California | 3 |
European Union | 3 |
Poland | 3 |
Portugal | 3 |
Saudi Arabia | 3 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 4 |
Health Insurance Portability… | 3 |
Individuals with Disabilities… | 1 |
Individuals with Disabilities… | 1 |
No Child Left Behind Act 2001 | 1 |
Privacy Act 1974 | 1 |
Assessments and Surveys
National Assessment of… | 1 |
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Charlotte Z. Mann; Adam C. Sales; Johann A. Gagnon-Bartsch – Grantee Submission, 2025
Combining observational and experimental data for causal inference can improve treatment effect estimation. However, many observational data sets cannot be released due to data privacy considerations, so one researcher may not have access to both experimental and observational data. Nonetheless, a small amount of risk of disclosing sensitive…
Descriptors: Causal Models, Statistical Analysis, Privacy, Risk
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Lili Ana – ProQuest LLC, 2024
This dissertation addresses the problem of practice of the high rate of employees in financial organizations clicking on phishing links, positioning their companies at risk of a data incident or breach. The financial sector was the most breached industry in 2022 (Schwartz, 2022) and was impacted the most by malicious phishing emails (Trellix…
Descriptors: Employees, Employee Attitudes, Electronic Mail, Computer Security
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
Leticia López-Castro; Mónica López-Ratón; Carolina Rodríguez-Llorente – Elementary School Journal, 2025
The link between technology use and cybervictimization in elementary education is less explored than in secondary education. Increased technology use since COVID-19 and high rates of cybervictimization among elementary students highlight the need to identify early risk factors. This study surveyed 1,169 families of fifth and sixth graders using a…
Descriptors: Crime, Victims, Elementary School Students, COVID-19
David B. Warner; Lisa McKee – Journal of Cybersecurity Education, Research and Practice, 2024
Data collection, use, leveraging, and sharing as a business practice and advantage has proliferated over the past decade. Along with this proliferation of data collection is the increase in regulatory activity which continues to morph exponentially around the globe. Adding to this complexity are the increasing business disruptions, productivity…
Descriptors: Information Security, Privacy, Governance, Compliance (Legal)
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Magsayo, Roche Tumlad – Interactive Technology and Smart Education, 2023
Purpose: This study aims to investigate the factors affecting (i.e. determinants) the continuance of mobile learning adoption in an informal setting among higher education learners from a rural region in the Philippines. It assesses the extent of the determinants of mobile learning adoption continuance and their interrelationships and the role of…
Descriptors: Electronic Learning, Adoption (Ideas), Rural Areas, College Students
Xuandong Zhao – ProQuest LLC, 2024
The rapid advancement of powerful Large Language Models (LLMs), such as ChatGPT and Llama, has revolutionized the world by bringing new creative possibilities and enhancing productivity. However, these advancements also pose significant challenges and risks, including the potential for misuse in the form of fake news, academic dishonesty,…
Descriptors: Computational Linguistics, Intellectual Property, Artificial Intelligence, Productivity
Li, Shijin; Gu, Xiaoqing – Educational Technology & Society, 2023
With artificial intelligence (AI) is extensively applied in education, human-centered AI (HCAI) has become an active field. There although has been increasing concern about how to systematically enhance the AI applications effect, AI risk governance in HCAI education has not been discussed yet. This study adopted literature meta-analysis, along…
Descriptors: Man Machine Systems, Artificial Intelligence, Risk, Delphi Technique
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Mark Anthony Camilleri – Interactive Technology and Smart Education, 2024
Purpose: Many educators are increasingly acquainting themselves and becoming adept with interactive technologies like augmented reality and virtual reality. Some of them are also looking forward to using Metaverse applications, as they want to benefit from its immersive three-dimensional capabilities. Therefore, the purpose of this study is to…
Descriptors: Artificial Intelligence, Educational Technology, Technology Uses in Education, Cost Effectiveness
Godfrey F. Mendes – ProQuest LLC, 2024
This Praxis develops a machine learning (ML) model to address ransomware threats in higher education institutions (HEIs). HEIs are vulnerable to cyberattacks due to their open-access environments, diverse user bases, and decentralized IT systems. These vulnerabilities are compounded by limited budgets, heightened risks from increased digital…
Descriptors: Colleges, Artificial Intelligence, Users (Information), Risk Assessment