Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Information Security | 2 |
| Labor Force Development | 2 |
| Student Attitudes | 2 |
| Best Practices | 1 |
| Computer Science Education | 1 |
| Data Use | 1 |
| Diversity | 1 |
| Educational Background | 1 |
| Employees | 1 |
| Engineering Education | 1 |
| More ▼ | |
Source
| Journal of Cybersecurity… | 2 |
Author
| Jens Myrup Pedersen | 1 |
| Kristian Helmer Kjær Larsen | 1 |
| Mubashrah Saddiqa | 1 |
| Nicholas, John B. | 1 |
| Ramlo, Susan E. | 1 |
| Robert Nedergaard Nielsen | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
Education Level
| High Schools | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Denmark | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mubashrah Saddiqa; Kristian Helmer Kjær Larsen; Robert Nedergaard Nielsen; Jens Myrup Pedersen – Journal of Cybersecurity Education, Research and Practice, 2024
Cybersecurity has traditionally been perceived as a highly technical field, centered around hacking, programming, and network defense. However, this article contends that the scope of cybersecurity must transcend its technical confines to embrace a more inclusive approach. By incorporating various concepts such as privacy, data sharing, and…
Descriptors: Labor Force Development, Diversity, Educational Background, Information Security
Ramlo, Susan E.; Nicholas, John B. – Journal of Cybersecurity Education, Research and Practice, 2020
Cybersecurity is a worldwide issue and concern. Prior studies indicate that many people do not use cybersecurity best practices. Although these prior studies used large-scale surveys or interviews, this study used Q methodology [Q] because Q provides greater insight than Likert-format surveys. In fact, Q was created to scientifically study…
Descriptors: Student Attitudes, Information Security, Best Practices, Computer Security

Peer reviewed
