Search

Your search keyword '"*COMPUTER security"' showing total 353,768 results

Search Constraints

Start Over You searched for: Descriptor "*COMPUTER security" Remove constraint Descriptor: "*COMPUTER security"
353,768 results on '"*COMPUTER security"'

Search Results

1. A Pragmatic Approach to Investigating the Digital Existence of Food Bank Users

2. Embracing Artificial Intelligence to Improve Self-Directed Learning: A Cybersecurity Classroom Study

3. Fostering Responsible Behavior Online-Relevance of Cyber Ethics Education

4. Examination of Cybersecurity in Open and Distance Learning within the Scope of Technical Support Services

5. Integrity, Confidentiality, and Equity: Using Inquiry-Based Labs to Help Students Understand AI and Cybersecurity

6. Integrating NIST and ISO Cybersecurity Audit and Risk Assessment Frameworks into Cameroonian Law

7. Contrasting Cognitive Theories of Learning Transfer to Advance Cybersecurity Instruction, Assessment, and Testing

8. Improving Belonging and Connectedness in the Cybersecurity Workforce: From College to the Profession

9. Building the Operational Technology (OT) Cybersecurity Workforce: What Are Employers Looking for?

10. Cybersecurity Skills, Knowledge and Abilities for Criminal Justice Professionals: An Exploratory Study of Practitioners' Perspectives

11. Leveraging VR/AR/MR/XR Technologies to Improve Cybersecurity Education, Training, and Operations

12. Turnstile File Transfer: A Unidirectional System for Medium-Security Isolated Clusters

13. An Interdisciplinary Approach to Experiential Learning in Cyberbiosecurity and Agriculture through Workforce Development

14. Blockchain Applications in Higher Education Based on the NIST Cybersecurity Framework

15. What You See Is Not What You Know: Studying Deception in Deepfake Video Manipulation

16. University of Johannesburg Institutional Repository Cybersecurity Output: 2015-2021 Interdisciplinary Study

17. Turkey vs. Italy: Gender and Cyber Security

18. Building a Diverse Cybersecurity Workforce: A Study on Attracting Learners with Varied Educational Backgrounds

19. Preparing UK Students for the Workplace: The Acceptability of a Gamified Cybersecurity Training

20. Development of Cyber Security Platform for Experiential Learning

21. Leading K-12 Community Responsiveness to Cyber Threats via Education of School Community

22. Infrastructure as Code for Cybersecurity Training

23. Privacy Principles and Harms: Balancing Protection and Innovation

24. An Unplugged Didactical Situation on Cryptography between Informatics and Mathematics

25. Hack It with EDUCHIC! Educational Hackathons and Interdisciplinary Challenges--Definitions, Principles, and Pedagogical Guidelines

26. Effecting Mobile Security Awareness and Interest in Cybersecurity Using the CovertEyeOp Mobile App Driven User Hack Based Learning Approach

27. Eight-Year-Olds' Naïve and Acquired Knowledge about Computer Viruses: A Mixed Methods Study

28. Ethical Considerations in a Pan-European Project Targeting Adolescent Cybercrime Prevention

29. An Exploration of the Awareness and Attitudes of Psychology Students Regarding Their Psychological Literacy for Working in the Cybersecurity Industry

30. K-12 Digital Infrastructure Brief: Defensible & Resilient. Version 1.0

31. Case Study: The Impact of Emerging Technologies on Cybersecurity Education and Workforces

32. Exploring the Strategic Cybersecurity Defense Information Technology Managers Should Implement to Reduce Healthcare Data Breaches

33. Teaching Case: Cybersecurity Assessment for a Manufacturing Company Using Risk Registers -- A Teaching Case

34. Cybersecurity Education in the Age of Artificial Intelligence: A Novel Proactive and Collaborative Learning Paradigm

35. Transforming Assessment: The Impacts and Implications of Large Language Models and Generative AI

36. Automated Feedback for Participants of Hands-On Cybersecurity Training

37. Longitudinal Associations between Online Usage of Library-Licensed Content and Undergraduate Student Performance

38. Sustainable and Efficient E-Learning Internet of Things System through Blockchain Technology

39. WebHOLE: Developing a Web-Based Hands-On Learning Environment to Assist Beginners in Learning Web Application Security

40. Sanctity of Digital Privacy and Personal Data during COVID-19: Are Youths Enough Digitally Literate to Deal with It?

41. Measuring Teachers' Knowledge on the Applications of the Nine Pillars of the Fourth Industrial Revolution (4IR) in Education

42. Digital Citizenship in Georgian's Teachers, Students and Parents

43. Thematic and Sentiment Analysis of Learners' Feedback in MOOCs

44. Review of CSEDM Data and Introduction of Two Public CS1 Keystroke Datasets

45. Examination of Cybersecurity Technologies, Practices, Challenges, and Wish List in K-12 School Districts

46. Sociocultural Barriers for Female Participation in STEM: A Case of Saudi Women in Cybersecurity

47. How Effective Are SETA Programs Anyway: Learning and Forgetting in Security Awareness Training

48. Compete to Learn: Toward Cybersecurity as a Sport

49. Educational Applications of the ChatGPT AI System: A Systematic Review Research

50. Cyber Terror Threats against Nuclear Power Plants

Catalog

Books, media, physical & digital resources