Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 4 |
| Since 2017 (last 10 years) | 8 |
Descriptor
| Computer Security | 8 |
| Foreign Countries | 8 |
| Barriers | 4 |
| Higher Education | 4 |
| Information Security | 3 |
| Universities | 3 |
| College Students | 2 |
| Computer Assisted Testing | 2 |
| Crime | 2 |
| Cultural Influences | 2 |
| Gender Bias | 2 |
| More ▼ | |
Source
| Arab World English Journal | 2 |
| Cogent Education | 1 |
| Education and Information… | 1 |
| Journal of Cybersecurity… | 1 |
| Journal of Information… | 1 |
| Online Submission | 1 |
| ProQuest LLC | 1 |
Author
Publication Type
| Journal Articles | 6 |
| Reports - Research | 6 |
| Books | 1 |
| Collected Works - Proceedings | 1 |
| Dissertations/Theses -… | 1 |
Education Level
| Higher Education | 6 |
| Postsecondary Education | 6 |
| Early Childhood Education | 1 |
| Elementary Education | 1 |
| Grade 1 | 1 |
| Kindergarten | 1 |
| Primary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Saudi Arabia | 8 |
| Albania | 1 |
| China | 1 |
| Croatia | 1 |
| Kentucky | 1 |
| Morocco | 1 |
| North Carolina | 1 |
| Philippines | 1 |
| Portugal | 1 |
| Taiwan | 1 |
| Taiwan (Taipei) | 1 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Aljuaid, Alanoud; Liu, Xiang Michelle – Journal of Cybersecurity Education, Research and Practice, 2023
The participation of women in Science, Technology, Engineering, and Mathematics (STEM) workforces is overwhelmingly low as compared to their male counterparts. The low uptake of cybersecurity careers has been documented in the previous studies conducted in the contexts of the West and Eastern worlds. However, most of the past studies mainly…
Descriptors: Barriers, Females, Participation, STEM Education
Alsager, Haroon Nasser – Arab World English Journal, 2020
Numerous studies have been concerned with developing new authorship recognition systems to address the increasing rates of cybercrimes associated with the anonymous nature of social media platforms, which still offer the opportunity for the users not to reveal their true identities. Nevertheless, it is still challenging to identify the real…
Descriptors: Social Media, Semitic Languages, Authors, Computer Security
Tahani Abdullah Abdurhman Alhumud; Abdulfattah Omar; Waheed M. A. Altohami – Cogent Education, 2023
Cybersecurity systems are crucial for safeguarding information assets across various sectors, including government, military, and commercial domains. In Saudi Arabia, cybersecurity has gained significant importance within the national security strategy, resulting in substantial investments in technologies to protect information assets, combat…
Descriptors: Information Security, Computer Security, Universities, Total Quality Management
Almuhaideb, Abdullah M.; Saeed, Saqib – Journal of Information Systems Education, 2021
ABET accreditation has become a well-known standard for academic programs not only in the U.S. but also across the globe. Instantiating the processes to systematically improve the quality of programs is a daunting task for higher education institutions. In this contribution, we provide a detailed process-based framework that can assist aspiring…
Descriptors: Engineering Education, Accreditation (Institutions), Computer Security, Crime
Almaiah, Mohammed Amin; Al-Khasawneh, Ahmad – Education and Information Technologies, 2020
The adoption of mobile cloud computing technology is still at an early stage of implementation in the university campus. This research aims to fill this gap by investigating the main factors that influence on the decision to adopt mobile cloud computing in the university campus. Therefore, this research proposes an integrated model, incorporating…
Descriptors: Information Storage, Handheld Devices, Computer Assisted Instruction, Technology Integration
Aljuaid, Alanoud – ProQuest LLC, 2022
There is a workforce shortage and a huge gender disparity in the cybersecurity profession globally and Saudi Arabia. Enabling women to access these opportunities involves bolstering training and implementing reforms to give women the go-ahead to access these opportunities. With only a paltry 5% of women being in cybersecurity in the Middle East…
Descriptors: Foreign Countries, Gender Differences, Computer Security, Information Security
Sharma, Vipin K.; Holbah, Wael A. – Arab World English Journal, 2022
The study investigates teachers' perceptions of the use of online language assessment (OLA) using technology and examines the scope of using online applications to validate the mode of assessment. It looks for EFL teachers' opinions of OLA to comprehend the many worries associated with the issues and improve the online assessment tools. The…
Descriptors: Language Teachers, Teacher Attitudes, English (Second Language), Second Language Learning
Jackowicz, Stephen, Ed.; Sahin, Ismail, Ed. – Online Submission, 2021
"Proceedings of International Conference on Humanities, Social and Education Sciences" includes full papers presented at the International Conference on Humanities, Social and Education Sciences (iHSES) which took place on April 22-25, 2021 in New York, USA-www.ihses.net. The aim of the conference is to offer opportunities to share…
Descriptors: History Instruction, Handheld Devices, Audio Equipment, Foreign Students

Peer reviewed
Direct link
