Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 8 |
Descriptor
| Computer Security | 8 |
| Responses | 8 |
| Incidence | 3 |
| Information Security | 3 |
| Internet | 3 |
| Administrator Attitudes | 2 |
| Administrator Role | 2 |
| College Students | 2 |
| Crisis Management | 2 |
| Foreign Countries | 2 |
| Higher Education | 2 |
| More ▼ | |
Source
| Journal of Information… | 2 |
| Behaviour & Information… | 1 |
| EDUCAUSE Review | 1 |
| Journal of Educational… | 1 |
| Online Submission | 1 |
| ProQuest LLC | 1 |
| Technology, Knowledge and… | 1 |
Author
| Agne Brilingaite | 1 |
| Alakrimi, Mahmoud M. | 1 |
| Enyeart, Mike | 1 |
| Evita Roponena | 1 |
| He, Wu | 1 |
| Hoff, Dianne L. | 1 |
| Hwang, Jae-Won | 1 |
| Janis Grabis | 1 |
| Joshua Hanna | 1 |
| Karen Parish | 1 |
| Kim, Rosemary | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 7 |
| Reports - Research | 5 |
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
| Speeches/Meeting Papers | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 7 |
| Postsecondary Education | 5 |
Audience
Location
| Libya | 1 |
| North Carolina | 1 |
| South Korea | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Joshua Hanna – ProQuest LLC, 2023
The rise in cyber-related attacks targeting school districts is outpacing cybersecurity readiness, as education institutions in the USA continue to fall victim to online threats (Levin, 2022). The education industry has been slow to react to an increasingly dangerous security landscape, leading many schools to become prime targets and victims of…
Descriptors: Superintendents, Administrator Attitudes, Administrator Role, Computer Security
Alakrimi, Mahmoud M. – Online Submission, 2022
The Documentation and Information Department of all Libyan universities is working on developing the university's website to suit all users with their different experiences and ways of interacting, so it is necessary to test the ease of use of these sites. That is why the researcher seeks to evaluate and compare his performance of these sites and…
Descriptors: Universities, Web Sites, Information Dissemination, Foreign Countries
Ruta Pirta-Dreimane; Agne Brilingaite; Evita Roponena; Karen Parish; Janis Grabis; Ricardo Gregorio Lugo; Martinš Bonders – Technology, Knowledge and Learning, 2025
Incorporating gamification elements and innovative approaches in training programs are promising for addressing cybersecurity knowledge gaps. Cybersecurity education should combine hard and soft skill development when building the capacity to manage cyber incidents requiring timely communication, team collaboration, and self-efficacy in risk…
Descriptors: Computer Security, Computer Science Education, Educational Games, Gamification
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Hoff, Dianne L.; Mitchell, Sidney N. – Journal of Educational Administration, 2009
Purpose: The purpose of this paper is to present research exploring the pervasiveness and causes of cyberbullying, the psychological impact on students, and the responses to cyberbullying from students and administrators. The goal is to give school leaders a greater understanding of this phenomenon and suggest steps to deal with this challenging…
Descriptors: Student Attitudes, Educational Policy, Bullying, Computer Security
Lee, Doohwang; Larose, Robert; Rifon, Nora – Behaviour & Information Technology, 2008
The objective of this study is to develop and test a model of online protection behaviour, particularly regarding the use of virus protection. Hypotheses are proposed concerning the predictors of the intention to engage in virus protection behaviour. Using a survey of 273 college students who use the Internet, a test of the hypotheses is conducted…
Descriptors: Self Efficacy, Intention, Computer Security, Multiple Regression Analysis
Enyeart, Mike; Staman, E. Michael; Valdes, Jose J., Jr. – EDUCAUSE Review, 2007
The concept of convergence has evolved significantly during recent years. Today, "convergence" refers to the integration of the communications and computing resources and services that seamlessly traverse multiple infrastructures and deliver content to multiple platforms or appliances. Convergence is real. Those in higher education, and especially…
Descriptors: Educational Opportunities, Higher Education, Educational Trends, Surveys

Direct link
Peer reviewed
