NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 31 to 45 of 1,430 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Thulasi M. Santhi; K. Srinivasan – IEEE Transactions on Learning Technologies, 2024
Cloud adoption in industrial sectors, such as process, manufacturing, health care, and finance, is steadily rising, but as it grows, the risk of targeted cyberattacks has increased. Hence, effectively defending against such attacks necessitates skilled cybersecurity professionals. Traditional human-based cyber-physical education is resource…
Descriptors: Artificial Intelligence, Information Security, Computer Security, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Galende-Domínguez, Inés; Rivero-Lezcano, Octavio M. – Research Ethics, 2023
Progress in precision medicine is being achieved through the design of clinical trials that use genetic biomarkers to guide stratification of patients and assignation to treatment or control groups. Genetic analysis of biomarkers is, therefore, essential to complete their objectives, and this involves the study of biological samples from donor…
Descriptors: Genetics, Medical Research, Patients, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Moraes, Eduardo Baldo; Kipper, Liane Mahlmann; Hackenhaar Kellermann, Ana Clara; Austria, Leonardo; Leivas, Pedro; Moraes, Jorge André Ribas; Witczak, Marcus – Interactive Technology and Smart Education, 2023
Purpose: The purpose of this study is to identify the uses of Industry 4.0 technologies in the area of education and how they contribute to learning in addition to highlighting at what educational level they are used. Design/methodology/approach: A systematic literature review was carried out in the Scopus (Elsevier), Web of Science and…
Descriptors: Educational Technology, Internet, Computer Simulation, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Di Gangi, Paul M.; Wech, Barbara A.; Hamrick, Jennifer D.; Worrell, James L.; Goh, Samuel H. – Journal of Cybersecurity Education, Research and Practice, 2023
Internet-of-Things (IoT) research has primarily focused on identifying IoT devices' organizational risks with little attention to consumer perceptions about IoT device risks. The purpose of this study is to understand consumer risk perceptions for personal IoT devices and translate these perceptions into guidance for future research directions. We…
Descriptors: Risk Assessment, Consumer Economics, Computer Security, Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2023
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are "general purpose" units (i.e., municipalities, counties, towns and townships).…
Descriptors: Information Security, Computer Security, Local Government, Public Policy
Bonnie B. Chelette – ProQuest LLC, 2023
K-12 schools in Louisiana face unique cybersecurity challenges due to the state's high poverty rate, resource constraints, infrastructure weaknesses, and vulnerability to natural disasters. Public school systems in Louisiana have been particularly vulnerable to these attacks, with incidents of cyberattacks tripling in 2020 alone. The Louisiana…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Barriers
Peer reviewed Peer reviewed
Direct linkDirect link
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
Yongbin Lee – ProQuest LLC, 2022
Organizations must ensure that employees maintain information security policy (ISP) compliance intentions with respect to published policies to improve their information security (IS) posture. Employees' noncompliance behaviors make them the weakest link in organizations' IS. Although IS researchers exert enormous amounts of effort on finding…
Descriptors: Ethics, Training, Information Security, Compliance (Legal)
Peer reviewed Peer reviewed
Direct linkDirect link
Levis Omusugu Amuya; Peterson Mwai Kariuki – Journal of Higher Education Policy and Management, 2024
Academic institutions today are experiencing a legion of security risks that are increasingly impeding their mission of producing high-quality graduates, guarding reason and educational integrity, and ultimately advancing human civilisation. The Enterprise Security Risk Management (ESRM) model represents a potential solution to the dynamic threats…
Descriptors: Foreign Countries, Universities, Risk Management, Accreditation (Institutions)
Peer reviewed Peer reviewed
Direct linkDirect link
Zeinab Mohammed; Fatma Abdelgawad; Mamoun Ahram; Maha E. Ibrahim; Alya Elgamri; Ehsan Gamel; Latifa Adarmouch; Karima El Rhazi; Samar Abd ElHafeez; Henry Silverman – Research Ethics, 2024
Members of research ethics committees (RECs) face a number of ethical challenges when reviewing genomic research. These include issues regarding the content and type of consent, the return of individual research results, mechanisms of sharing specimens and health data, and appropriate community engagement efforts. This article presents the…
Descriptors: Research, Ethics, Committees, Attitudes
Michael J. Becker – ProQuest LLC, 2024
Effective management of digital identities and personal data is essential in modern society. Personal information management systems (PIMS) empower people to control their digital identities and personal data. Using the reasoned action approach (RAA) developed by Fishbein and Ajzen (2010), I derived the RAA-Trust Model for PIMS Adoption and…
Descriptors: Information Management, Information Security, Data, Adults
Peer reviewed Peer reviewed
Direct linkDirect link
Joshua M. Rosenberg; Conrad Borchers; Sondra M. Stegenga; Macy A. Burchfield; Daniel Anderson; Christian Fischer – Learning, Media and Technology, 2024
Schools and school districts use social media for a variety of reasons, but alongside the benefits of schools' social media use come potential risks to students' privacy. Using a novel dataset of around 18 million Facebook posts by schools and districts in the United States, we explore the extent to which personally identifiable information of…
Descriptors: Social Media, Elementary Schools, Secondary Schools, Information Security
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Monica Tatasciore; Luke Strickland; Shayne Loft – Cognitive Research: Principles and Implications, 2024
Increased automation transparency can improve the accuracy of automation use but can lead to increased bias towards agreeing with advice. Information about the automation's confidence in its advice may also increase the predictability of automation errors. We examined the effects of providing automation transparency, automation confidence…
Descriptors: Automation, Access to Information, Information Technology, Bias
Peer reviewed Peer reviewed
Direct linkDirect link
Bendler, Daniel; Felderer, Michael – ACM Transactions on Computing Education, 2023
Competency models are widely adopted frameworks that are used to improve human resource functions and education. However, the characteristics of competency models related to the information security and cybersecurity domains are not well understood. To bridge this gap, this study investigates the current state of competency models related to the…
Descriptors: Models, Information Security, Computer Security, Competence
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  96