NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Karolína Dockalová Burská; Jakub Rudolf Mlynárik; Radek Ošlejšek – Education and Information Technologies, 2024
In cyber security education, hands-on training is a common type of exercise to help raise awareness and competence, and improve students' cybersecurity skills. To be able to measure the impact of the design of the particular courses, the designers need methods that can reveal hidden patterns in trainee behavior. However, the support of the…
Descriptors: Computer Science Education, Information Security, Computer Security, Training Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mehmet Fatih Yigit – Journal of Learning and Teaching in Digital Age, 2025
Technology, while enhancing efficiency and effectiveness, also poses significant cyber threats and risks. Overcoming these challenges necessitates individuals to have high levels of cybersecurity awareness and to exhibit proper cybersecurity behaviors. Correspondingly, in recent years, the exploration of individual factors influencing…
Descriptors: Metacognition, Computer Security, Information Security, Student Behavior
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Smith, Gwendolynn T. – ProQuest LLC, 2012
The increasing dependence on technology presented more vulnerability to security breaches of information and the need to assess security awareness levels in federal organizations, as well as other organizations. Increased headlines of security breaches of federal employees' security actions prompted this study. The research study reviewed the…
Descriptors: Federal Government, Employees, Users (Information), Futures (of Society)