Search

Your search keyword '"Security education"' showing total 95 results

Search Constraints

Start Over You searched for: Descriptor "Security education" Remove constraint Descriptor: "Security education" Publication Type Academic Journals Remove constraint Publication Type: Academic Journals
95 results on '"Security education"'

Search Results

1. Establishing a Model for the User Acceptance of Cybersecurity Training.

2. Building a self-evolving iMonsters board game for cyber-security education.

4. برنامج مقترح في التربية الأمنية متعدد المداخل التدريسية لتنمية الثقافة الأمنية والقانونية في ظل التلوث المعلوماتي الرقمي لدى طلاب شعبة الجغرافيا بكلية التربية جامعة الأزهر.

5. REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory

6. PROSEC TEST FOR THRIVE PROTECTIVE SECURITY RULES AGAINST THREATS, RISKS AND VULNERABILITIES

7. Establishing a Model for the User Acceptance of Cybersecurity Training

8. Factors influencing the development of a successful cybersecurity culture.

9. Blending cybersecurity education with IoT devices: A u-Learning scenario for introducing the man-in-the-middle attack.

10. Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance.

11. PROSEC TEST FOR THRIVE PROTECTIVE SECURITY RULES AGAINST THREATS, RISKS AND VULNERABILITIES.

12. Context-Based Support to Enhance Developers' Learning of Software Security.

13. Proposal of Cyber Range for Control System based on Virtual Commissioning Technology.

14. Human Factors in Security – Cybersecurity Education and Awareness of Business Students

15. The Role of the Military Sciences Course in Enhancing the Contents of Security Education among Students of the University of Jordan

16. دور مساق العلوم العسكرية في تعزيز مضامين التربية الأمنية لدى طلبة الجامعة الأردنية.

17. Context-Based Support to Enhance Developers’ Learning of Software Security

18. SECURITY EDUCATION -THE MAIN TOOL FOR STRENGTHENING THE SECURITY CULTURE.

19. The education system in the development of total defence. Poland’s perspective.

20. Special Session: ACM Joint Task Force on Cyber Education

21. Human Factors in Security – Cybersecurity Education and Awareness of Business Students.

22. Security education as a practical dimension of implementing sustainable development concept

23. Security issues and security education

24. Training Users to Identify Phishing Emails.

26. ROMANIA'S SECURITY CULTURE -- THE HOT POTATO WE SHOULD TALK ABOUT.

27. THE SYSTEM OF DEFENCE EDUCATION SYSTEM FOR POLISH YOUTH AFTER 1989 AND ITS TRANSFORMATIONS.

28. Choose your own training adventure: designing a gamified SETA artefact for improving information security and privacy through interactive storytelling.

29. Counteracting Threats to Societal Security at School

30. Beyond Proscription: Rethinking Government Response to ‘Yan Shilla’ Gang Violence in Yola Metropolis of Adamawa State, Nigeria

31. TYPES OF SECURITY EDUCATION IN POLAND. SELECTED EXAMPLES

32. SECURITY EDUCATION IN DANGEROUS TIMES

33. STUDENTS’ OPINIONS ABOUT THE SUBJECT OF SECURITY EDUCATION IN UPPER SECONDARY SCHOOLS

34. On Security Education in Poland. The Essence and Content of the Subject of Education

35. A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus

36. INFORMATION SYSTEMS SECURITY EDUCATION: MIS MAJORS AND BUSINESS MAJORS IN AACSB COLLEGE OF BUSINESSES.

37. The Influence of Reflection in an Introductory Security Course: A Single Case Study.

38. The perception of the negative effects of migration as a security risk to the citizens of the Slovak Republic.

41. APPROACHES TO STUDYING ACROSS CULTURALLY CONTRASTING GROUPS: IMPLICATIONS FOR SECURITY EDUCATION

42. Impact of the Implementation of Security Education Curriculum on Students' Security Consciousness in Nigeria.

43. A MODEL GRADUATE ENTERPRISE SECURITY COURSE.

44. Improving software security awareness using a serious game.

45. SETA and Security Behavior: Mediating Role of Employee Relations, Monitoring, and Accountability.

46. Spear phishing in a barrel: Insights from a targeted phishing campaign.

47. The Need for Innovation of Security Education for Strengthening the Results of Traditional Teaching at Universities

48. Expert assessment of organizational cybersecurity programs and development of vignettes to measure cybersecurity countermeasures awareness.

50. What Is This Sensor and Does This App Need Access to It?

Catalog

Books, media, physical & digital resources