To see the other types of publications on this topic, follow the link: Cyber security education.

Journal articles on the topic 'Cyber security education'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cyber security education.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Krutz, Daniel E., and Thomas Richards. "Cyber security education." ACM Inroads 8, no. 4 (2017): 5. http://dx.doi.org/10.1145/3132217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Esenalieva, Gulzat. "CYBER SECURITY IN THE EDUCATION SYSTEM." Alatoo Academic Studies 2022, no. 1 (2022): 167–71. http://dx.doi.org/10.17015/aas.2022.221.21.

Full text
Abstract:
In the modern educational process, the field of informatization and cybersecurity threats is of great relevance today. It should be noted that informatization processes and cybersecurity problems in the educational environment are interconnected. The rapid development of information technologies and widespread digitalization has seen a trend of large-scale application in the field of education of new ways of communication, organization of the educational process, and knowledge control. A number of problems that have been observed recently in the process of using information technologies in the
APA, Harvard, Vancouver, ISO, and other styles
3

RICCI, Sara, Jan HAJNY, Edmundas PIESARSKAS, Simon PARKER, and Vladimir JANOUT. "Challenges in Cyber Security Education." International Journal of Information Security and Cybercrime 9, no. 2 (2020): 7–11. http://dx.doi.org/10.19107/ijisc.2020.02.01.

Full text
Abstract:
Cyber security education is an important and pertinent topic as it plays a major role in mitigating the risks caused by a global shortage of cyber security experts. In order to better support this crucial function, a cyber security skills framework needs to be agreed upon by academics in this field, along with an increase in the visibility of cyber security education and training. Without these, there is likely to be a long-term shortfall between the number of skilled cyber security professionals and demand, potentially leaving organisations, institutions, and governments vulnerable. Our contri
APA, Harvard, Vancouver, ISO, and other styles
4

Moran, Addy, Ford Powers, Lisa Campbell, and Melanie Rodriguez. "The PISCES Approach to Cyber Education." Journal of The Colloquium for Information Systems Security Education 11, no. 1 (2024): 5. http://dx.doi.org/10.53735/cisse.v11i1.190.

Full text
Abstract:
The following is a partner paper published to the CISSE journal. For more information, please visit the PISCES website. The Public Infrastructure Security Cyber Education System (PISCES) program has had significant impact on the cyber security posture of small municipalities and has helped develop qualified entry-level cyber analysts with real-world experience. Due to the ever-evolving nature of cyber security, adjusting our cyber security educational approach to be just as flexible is of dire importance. This paper will address how the PISCES program educates the students and partners with th
APA, Harvard, Vancouver, ISO, and other styles
5

Hanif, Mohaddes Deylami, and Mohaddes Deylami1 2. Mahsa Mohaghegh1 Abdolhossein Sarrafzadeh1 Michael McCauley1 Iman Tabatabaei Ardekani1 Tamsin Kingston1 Hanif. "CAPTURE THE TALENT: SECONDARY SCHOOL EDUCATION WITH CYBER SECURITY COMPETITIONS." International Journal on Foundations of Computer Science & Technology (IJFCST) 5, no. 6 (2023): 12. https://doi.org/10.5281/zenodo.7970572.

Full text
Abstract:
Recent advances in computing have caused cyber security to become an increasingly critical issue that affects our everyday life. Both young and old in society are exposed to benefits and dangers that accompany technological advance. Cyber security education is a vital part of reducing the risks associated with cyber-threats. This is particularly important for current and future youth, who are the most technology-literate generations. Many research studies and competitions have been undertaken around the world to emphasize and identify the significance of cyber security as a relevant and pressi
APA, Harvard, Vancouver, ISO, and other styles
6

Mohd Ariffin, Muhammad Azizi, Mohamed Yusof Darus, Haryani Haron, Aditya Kurniawan, Yohan Muliono, and Chrisando Ryan Pardomuan. "Deployment of Honeypot and SIEM Tools for Cyber Security Education Model In UITM." International Journal of Emerging Technologies in Learning (iJET) 17, no. 20 (2022): 149–72. http://dx.doi.org/10.3991/ijet.v17i20.32901.

Full text
Abstract:
Nowadays the threat of cyber-attacks is increasing as more organizations undergo digital transformation. Therefore, organizations need to take proactive measures to mitigate the cyber threat to avoid further loss to their business. To mitigate cyber risk effectively, organizations need to employ competent people in the IT security team to implement effective security controls. But there is a shortage of cyber security talent or professionals in the job market and to produce talents in the cyber security field requires extensive effort in education and training. A good cyber security education
APA, Harvard, Vancouver, ISO, and other styles
7

Yue, On-Ching. "Cyber security." Technology in Society 25, no. 4 (2003): 565–69. http://dx.doi.org/10.1016/j.techsoc.2003.09.022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Lehto, Martti, and Pekka Neittaanmäki. "Cyber security training in Finnish basic and general upper secondary education." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 199–208. http://dx.doi.org/10.34190/iccws.18.1.984.

Full text
Abstract:
Cyber security in Finland is part of other areas of comprehensive security, as digital solutions multiply in society and technologies advance. Cyber security is one of the primary national security and national defense concerns. Cyber security has quickly evolved from a technical discipline to a strategic concept. Cyber security capacity building can be measured based on the existence and number of research and developments, education and training programs, and certified professionals and public sector agencies.
 Cybersecurity awareness and the related civic skills play an increasingly im
APA, Harvard, Vancouver, ISO, and other styles
9

Kayisoglu, Gizem, Pelin Bolat, and Emre Duzenli. "Modelling of Maritime Cyber Security Education and Training." Pedagogika-Pedagogy 95, no. 6s (2023): 64–78. http://dx.doi.org/10.53656/ped2023-6s.07.

Full text
Abstract:
The existence of sophisticated and integrated cyberspace aboard ships with information technology (IT) and operational technology (OT) makes cybersecurity a crucial concern for the maritime sector. The marine sector has benefited greatly from information and communication technologies, but they have also made ship systems and maritime infrastructure more susceptible to cyberattacks. Cyberattacks on ships have the potential to result in fatalities, severe financial losses, environmental damage, and other negative effects. A model course or specification for maritime cyber security education and
APA, Harvard, Vancouver, ISO, and other styles
10

Annesha, Dutta &. Dr Remith George Carri. "CHILDREN AND INTERNET: EMPOWERING LEARNERS WITH CYBER SECURITY EDUCATION." Scholarly Research Journal for Humanity Science & English Language 13, no. 67 (2025): 30–37. https://doi.org/10.5281/zenodo.14858571.

Full text
Abstract:
<em>Internet and technology have become an integral part of everyone's life. The penetration of the Internet and net-based technology into education has greatly benefited students in terms of access to information. However, excessive dependence and use of internet technologies pose a potential threat to users; making them, especially students, susceptible to cyber threats and crimes such as hacking, phishing, cyberbullying, etc. Although students extensively use the internet for learning, gaming, and other online activities, their awareness about the threats looming in the cyber world remains
APA, Harvard, Vancouver, ISO, and other styles
11

HAGGMAN, Andreas. "Wargaming in Cyber Security Education and Awareness Training." International Journal of Information Security and Cybercrime 8, no. 1 (2019): 35–38. http://dx.doi.org/10.19107/ijisc.2019.01.04.

Full text
Abstract:
This paper introduces readers to core concepts around cyber wargaming. Wargames can be powerful learning tools, but few wargames exist to teach players about cyber security. By way of highlighting possibilities in this space, the author has developed an original educational tabletop wargame based on the UK National Cyber Security Strategy and deployed the game to a variety of organisations to determine its pedagogic efficacy. Overall, it is found that the game was effective in generating high-engagement participation and clear learning opportunities. Furthermore, there are design lessons to be
APA, Harvard, Vancouver, ISO, and other styles
12

Reid, Rayne, and Johan van Niekerk. "Brain-compatible, web-based information security education: a statistical study." Information Management & Computer Security 22, no. 4 (2014): 371–81. http://dx.doi.org/10.1108/imcs-11-2013-0081.

Full text
Abstract:
Purpose – This paper aims to demonstrate that learners prefer brain-compatible cyber security educational material, over traditional presentation methods. Design/methodology/approach – A prototype brain-compatible cyber security educational system was evaluated using a survey as a research instrument. Findings – Presenting cyber security material in a brain-compatible manner is an effective way in which to stimulate the learners’ interest, engages them in the learning experience and motivates them to learn. Originality/value – As far as could be determined, no previous studies showed the relev
APA, Harvard, Vancouver, ISO, and other styles
13

Ceko, Enriko. "Cyber security issues in Albanian higher education institutions curricula." CRJ, no. 1 (September 18, 2023): 56–65. http://dx.doi.org/10.59380/crj.v1i1.2728.

Full text
Abstract:
Cybercrime and the phenomena accompanying, currently with international nature, targeting the main sectors of world economy, are main challenges facing individuals, families, societies and states, four main operators in the open market. An appropriate response to cybercrime, having a high and complete cyber security system, employing legal instruments, IT protocols and ISO standards related with this issue, is a priority. Undertaking this research, a review of curricula and syllabuses of economic, law and IT faculties of public and private higher university institutions in Albania have been do
APA, Harvard, Vancouver, ISO, and other styles
14

RAGAVENDRAN, V. A., and Dr A. MEENAKSHI. "AN ANALYSIS OF THE LITERATURE ON SOCIETY'S CONCERNS ON INDIA'S CYBERSECURITY IN THE TWENTY-FIRST CENTURY." International Journal of Social Sciences and Management Review 06, no. 01 (2023): 103–9. http://dx.doi.org/10.37602/ijssmr.2022.6107.

Full text
Abstract:
Cyber security is concerned with matters of cyber-ethics and cyber-safety. The idea of cyber security should be introduced to and ingrained from a young age. Security countermeasures aid in preserving the confidentiality, availability, and integrity of information systems by preventing or lessening asset losses brought on by cyber security threats. An intrusion detection system (IDS) application analyses what happens during an execution and searches for indications that the computer has been mistreated. Numerous metaphors, including those relating to biological processes, healthcare, markets,
APA, Harvard, Vancouver, ISO, and other styles
15

Alexei, Arina. "CYBER SECURITY STRATEGIES FOR HIGHER EDUCATION INSTITUTIONS." Journal of Engineering Science XXVIII, no. 4 (2021): 74–92. http://dx.doi.org/10.52326/jes.utm.2021.28(4).07.

Full text
Abstract:
Due to the large volume of data they manage, Higher Education Institutions (HEIs) are perfect targets for cyber attackers. University networks are open in design, decentralized and multi-user, making them vulnerable to cyber-attacks. The purpose of this research paper was to identify which is the recommended cyber security strategy and how comprehensive are these studies, within HEIs. The method proposed by Kitchenham was used, focused on the information community. Thus, the following results can be communicated: researchers recommend their own security strategies, because the standards analys
APA, Harvard, Vancouver, ISO, and other styles
16

Horlichenko, Serhiі. "FEATURES OF MODERN CONCEPTUAL AND TERMINOLOGICAL APPARATUS IN THE FIELD OF TRAINING OF CYBER SECURITY SPECIALISTS." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 171–81. http://dx.doi.org/10.28925/2663-4023.2024.23.171181.

Full text
Abstract:
The article examines the relevance of ensuring the sustainable development of high-quality cyber security of the state, as the main component of a modern digital society. Guidelines for the training of personnel of cyber security agencies of Ukraine were studied. The main normative legal acts regulating the system of educational training of experts in the domain of cyber security have been analyzed. The education system of personnel education in the cyber security niche is generally characterized and compared with the main elements of the general education system of Ukraine. The theoretical as
APA, Harvard, Vancouver, ISO, and other styles
17

Haseski, Halil İbrahim. "Cyber Security Skills of Pre-Service Teachers as a Factor in Computer-Assisted Education." International Journal of Research in Education and Science 6, no. 3 (2020): 484. http://dx.doi.org/10.46328/ijres.v1i1.1006.

Full text
Abstract:
The present study aimed to determine the effect of individual cyber security skills of pre-service teachers on their attitudes towards computer-assisted education. Thus, the present research was designed as a correlational study. The study participants included 241 senior pre-service teachers in different departments at Manisa Celal Bayar University, Faculty of Education during the 2019-2020 academic year the fall semester. The data were collected with the "Personal Cyber Security Provision Scale" and "The Attitude Toward Computer-Assisted Education Scale." Based on the study findings, pre-ser
APA, Harvard, Vancouver, ISO, and other styles
18

Haseski, Halil İbrahim. "Cyber Security Skills of Pre-Service Teachers as a Factor in Computer-Assisted Education." International Journal of Research in Education and Science 6, no. 3 (2020): 484. http://dx.doi.org/10.46328/ijres.v6i3.1006.

Full text
Abstract:
The present study aimed to determine the effect of individual cyber security skills of pre-service teachers on their attitudes towards computer-assisted education. Thus, the present research was designed as a correlational study. The study participants included 241 senior pre-service teachers in different departments at Manisa Celal Bayar University, Faculty of Education during the 2019-2020 academic year the fall semester. The data were collected with the "Personal Cyber Security Provision Scale" and "The Attitude Toward Computer-Assisted Education Scale." Based on the study findings, pre-ser
APA, Harvard, Vancouver, ISO, and other styles
19

Atlam, Hany F. "LLMs in Cyber Security: Bridging Practice and Education." Big Data and Cognitive Computing 9, no. 7 (2025): 184. https://doi.org/10.3390/bdcc9070184.

Full text
Abstract:
Large Language Models (LLMs) have emerged as powerful tools in cyber security, enabling automation, threat detection, and adaptive learning. Their ability to process unstructured data and generate context-aware outputs supports both operational tasks and educational initiatives. Despite their growing adoption, current research often focuses on isolated applications, lacking a systematic understanding of how LLMs align with domain-specific requirements and pedagogical effectiveness. This highlights a pressing need for comprehensive evaluations that address the challenges of integration, general
APA, Harvard, Vancouver, ISO, and other styles
20

Șestacov, Andrei. "Cyber Security Deficiencies in the Education Environment." Homo et Societas 5 (2020): 141–49. http://dx.doi.org/10.4467/25436104hs.20.010.13243.

Full text
Abstract:
Information technologies have already radically transformed the communications and information technology sectors, trade, media, and the education sector, especially education, which is on the top priority. Digital technologies will radically change the way data is sent and retrieved, will allow immediate and real-time feedback from students, will facilitate access to education through distance learning, will allow new service providers to enter traditional markets education. Thus, a diligent and well planned implementation of cyber security, as well as information security of information netw
APA, Harvard, Vancouver, ISO, and other styles
21

Ananin, V., and O. Uvarkina. "CURRENT POLITICAL MAINSTREAMS OF MILITARY EDUCATION." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(53) (July 8, 2022): 41–46. http://dx.doi.org/10.20535/2308-5053.2022.1(53).261106.

Full text
Abstract:
The problem horizon of the current state of Ukrainian military education is quite wide, and the amplitude of conceptual points of view to the development of new models of military education fluctuates within a very wide range. The analysis of theoretical and practical problems has shown the dominance of consensus on the strategic course of the state policy on NATO membership. It was determined that the modern gabitus of the political mainstream of military education today is the National Security Strategy of Ukraine, which is based on the triad of principles “deterrence-sustainability-interact
APA, Harvard, Vancouver, ISO, and other styles
22

Perwej, Dr Yusuf, Syed Qamar Abbas, Jai Pratap Dixit, Dr Nikhat Akhtar, and Anurag Kumar Jaiswal. "A Systematic Literature Review on the Cyber Security." International Journal of Scientific Research and Management 9, no. 12 (2021): 669–710. http://dx.doi.org/10.18535/ijsrm/v9i12.ec04.

Full text
Abstract:
In recent years, the Internet has become an integral element of people's everyday lifestyles all across the world. Online criminality, on the other hand, has risen in tandem with the growth of Internet activity. Cyber security has advanced greatly in recent years in order to keep up with the rapid changes that occur in cyberspace. Cyber security refers to the methods that a country or organization can use to safeguard its products and information in cyberspace. Two decades ago, the term "cyber security" was barely recognized by the general public. Cyber security isn't just a problem that affec
APA, Harvard, Vancouver, ISO, and other styles
23

Marpaung, Jonathan Nahum. "Cyber Security in Indonesian Higher Education Institutions: Lessons Learned from Recent Cyber Attacks." Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 10, no. 1 (2025): 343. https://doi.org/10.30645/jurasik.v10i1.876.

Full text
Abstract:
Cyber security is paramount to the sustainability of higher education institutions as more institutions move their information system to the cloud and allow stakeholders to access their information technology services from on-campus WIFI and mobile devices. This study aims to understand Indonesian higher education's current cyber security landscape by analyzing recent cyber-attacks that hit all sectors, notably higher education. Recent news articles and government reports related to cyber-security were analyzed using document analysis. This study found that data theft attacks were the number o
APA, Harvard, Vancouver, ISO, and other styles
24

Saharinen, Karo, Jarmo Viinikanoja, and Jouni Huotari. "Researching Graduated Cyber Security Students – Reflecting Employment and Job Responsibilities through NICE framework." European Conference on Cyber Warfare and Security 21, no. 1 (2022): 247–55. http://dx.doi.org/10.34190/eccws.21.1.201.

Full text
Abstract:
Most research and development on Cyber Security education is currently focusing on what should be taught, how much, and where within the degree programmes. Different Cyber Security frameworks are currently evolving to include Cyber Security education parallel to older paradigms of Computing Education, existing alongside with such as “Information Technology” and “Software Engineering”. Different Cyber Security specialisations or even whole degree programmes have started within universities before the frameworks have been defined into standardised degree structures. This is mainly the result of
APA, Harvard, Vancouver, ISO, and other styles
25

Tanwar, Prof Rakesh. "Cyber Security Challenges." International Journal for Research in Applied Science and Engineering Technology 13, no. 1 (2025): 564–66. https://doi.org/10.22214/ijraset.2025.66263.

Full text
Abstract:
In an increasingly digitized world, cybersecurity has emerged as a critical domain for ensuring the safety and integrity of information systems. This paper provides a comprehensive overview of the current state of cybersecurity, highlighting the evolving threat landscape, key challenges, and strategic defenses. Cyber threats have become more sophisticated and widespread, targeting both individuals and organizations. These threats include various forms of malware, phishing attacks, ransomware, and advanced persistent threats. As a result, the need for robust cybersecurity measures has never bee
APA, Harvard, Vancouver, ISO, and other styles
26

Ivanusa, A. I., R. L. Tkachuk, N. O. Maslova, V. I. Yashchuk, and A. M. Tkachenko. "INFORMATION SECURITY AND CYBER SECURITY MANAGEMENT IN HIGHER EDUCATION INSTITUTIONS." Bulletin of Lviv State University of Life Safety 31 (2025): 101–16. https://doi.org/10.32447/20784643.31.2025.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Lehto, Martti. "Cyber Security Education and Research in the Finland's Universities and Universities of Applied Sciences." International Journal of Cyber Warfare and Terrorism 6, no. 2 (2016): 15–31. http://dx.doi.org/10.4018/ijcwt.2016040102.

Full text
Abstract:
The revolution in information technology that began in the 1990s has been transforming Finland into an information society. Imaginative data processing and utilization, arising from the needs of citizens and the business community, are some of the most important elements in a thriving society. Information and know-how have become key ‘commodities' in society, and they can be utilized all the more efficiently through information technology. For all nations, the information technology revolution quietly changed the way business and government operate, as well as the daily life of citizens. Our d
APA, Harvard, Vancouver, ISO, and other styles
28

Bagó, Péter. "Cyber security and artificial intelligence." Economy & finance 10, no. 2 (2023): 189–212. http://dx.doi.org/10.33908/ef.2023.2.5.

Full text
Abstract:
Cyber security is one of the key challenges in the age of information technology, which is particularly important in the financial sector, where security is key both for customers and institutions. Data protection, fighting fraud and preventing cyber attacks are areas in which artificial intelligence and automated systems can provide significant assistance. The use of AI and machine learning for cybersecurity allows systems to be recovered quickly and effectively after a cyber attack. Using AI algorithms, experts can immediately assess damage and respond to cyber incidents with AI. In the pape
APA, Harvard, Vancouver, ISO, and other styles
29

Ananin, V., and O. Uvarkina. "POLITICAL VISIONS OF CYBER EDUCATION." National Technical University of Ukraine Journal. Political science. Sociology. Law, no. 1(57) (May 31, 2023): 35–39. http://dx.doi.org/10.20535/2308-5053.2023.1(57).280780.

Full text
Abstract:
This article is the first to analyze the political visions of the new US National Cybersecurity Strategy in terms of cyber education, which in the current security situation is becoming a kind of habitus of the global information space and launches a new long-term policy of the key Ukrainian international partnership in harmonizing security approaches. The identification of new priorities in both the global and national security environment focuses the attention of the US Strategy on a comprehensive and coordinated approach of public policy towards expanding access to cyber education to meet t
APA, Harvard, Vancouver, ISO, and other styles
30

Bystrova, Bogdana. "Comparative Analysis of Curricula for Bachelor’s Degree in Cyber Security in the USA and Ukraine." Comparative Professional Pedagogy 7, no. 4 (2017): 114–19. http://dx.doi.org/10.1515/rpp-2017-0058.

Full text
Abstract:
Abstract At the present stage of science and technology development the need to strengthen cyber security in every developed country and transform it into one of the most important sectors of society is growing. The peculiarities of the professional training of cyber security bachelors in the U.S. higher education system have been defined. The relevance of this approach is determined by the dynamics of technological advances. An innovative approach is a methodological platform for research and students’ project work, their communication with professional scientific community on the stage of th
APA, Harvard, Vancouver, ISO, and other styles
31

Trisolvena, Muhammad Nana, and Nana Handre Saputra. "Phishing Cyber Security Threats." Jurnal Improsci 2, no. 1 (2024): 38–48. http://dx.doi.org/10.62885/improsci.v2i1.440.

Full text
Abstract:
Phishing is a growing threat in the realm of cybersecurity, where cybercriminals use various phishing techniques to steal sensitive information from individuals and organizations. In practice, phishing aims to obtain personal, account, and financial data by impersonating trusted parties through fake emails, websites, text messages, or social media. The term "phishing" comes from the word "fishing" which describes an attempt to lure prey with fake bait. The most common types of phishing include web phishing, email phishing, smishing phishing, scam phishing, blind phishing, whaling phishing, and
APA, Harvard, Vancouver, ISO, and other styles
32

Jalihal, Shreyas. "Importance of Cyber Security in Gaming Industry: A Review." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34116.

Full text
Abstract:
The Gaming industry, which was once a small industry, has now become one of the fastest-growing industries in the world. With the development of internet technology, online gaming has become a way of entertainment and connecting among the young generation of the modern era. This review paper speaks about the cyber security required in gaming to protect players and gaming companies from potential losses from cyber attacks. By exploring different situations, this paper explores various and effective security measures for the gaming industry. This paper also discusses existing cyber security tech
APA, Harvard, Vancouver, ISO, and other styles
33

R. Nair, Rejani. "AWARENESS, THREATS AND PERCEPTION OFCYBER SECURITY." International Journal of Advanced Research 13, no. 05 (2025): 756–63. https://doi.org/10.21474/ijar01/20957.

Full text
Abstract:
With the rapid advancement of modern technology, online education has become more accessible than ever, enabling learners to receive the same high-quality experience and outcomes as traditional education through a virtual platform. However, with these advancements comes an expanded threat from cyber criminals. Computer security, cyber security or information technology security is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data, as well as from the disrupti
APA, Harvard, Vancouver, ISO, and other styles
34

Karagozlu, Damla. "Determination of cyber security ensuring behaviours of pre-service teachers." Cypriot Journal of Educational Sciences 15, no. 6 (2020): 1698–706. http://dx.doi.org/10.18844/cjes.v15i6.5327.

Full text
Abstract:
As cyber security attack rates increase, so do cyber security concerns. Cyber security is the collection of tools, policies, security concepts, security measures, risk management approaches, actions, education, applications, security and technologies that can be used in order to protect the cyber environment and user rights. The aim of this study is to determine the behaviours of pre-service teachers as this study’s objective is to determine the behaviours of pre-service teachers regarding cyber security. This study is designed according to the quantitative research method and the Personal Cyb
APA, Harvard, Vancouver, ISO, and other styles
35

Ondrušková, Dana, and Richard Pospíšil. "The good practices for implementation of cyber security education for school children." Contemporary Educational Technology 15, no. 3 (2023): ep435. http://dx.doi.org/10.30935/cedtech/13253.

Full text
Abstract:
The increasing use of the Internet calls upon the need for adequate cyber security awareness to better face the risk and dangers connected with the online environment. This research presents an experiment that revealed the cyber security awareness of children at Czech primary schools. They were tested for their skills to distinguish different online risks. After the pre-testing children received training and with the time delay they filled in very similar questionnaires. The re-testing measured how well the children retained the training and their ability to use the skills in the virtual envir
APA, Harvard, Vancouver, ISO, and other styles
36

Sverdlyk, Zoriana. "Cyber Security and Cyber Protection: Topics on the Agenda in Ukrainian Society." Ukrainian Journal on Library and Information Science, no. 10 (December 28, 2022): 175–88. https://doi.org/10.31866/2616-7654.10.2022.269495.

Full text
Abstract:
The aim of the article&nbsp;is to analyse the concepts of &laquo;cyber hygiene&raquo;, &laquo;cyber security&raquo;, &laquo;cyber protection&raquo;, and clarify the role of those processes which are interpreted by these terms in modern human life; to identify the main achievements in Ukrainian law system regarding the legal cybernetic sphere regulation; to highlight key rules for observing cyber hygiene. The research methodology&nbsp;has been implemented using scientific methods of terminological analysis when comparing the definitions of relevant terms. Statistical method has been used in ord
APA, Harvard, Vancouver, ISO, and other styles
37

Sverdlyk, Zoriana. "Cyber Security and Cyber Protection: Topics on the Agenda in Ukrainian Society." Ukrainian Journal on Library and Information Science, no. 10 (December 28, 2022): 175–88. http://dx.doi.org/10.31866/2616-7654.10.2022.269495.

Full text
Abstract:
The aim of the article is to analyse the concepts of «cyber hygiene», «cyber security», «cyber protection», and clarify the role of those processes which are interpreted by these terms in modern human life; to identify the main achievements in Ukrainian law system regarding the legal cybernetic sphere regulation; to highlight key rules for observing cyber hygiene. The research methodology has been implemented using scientific methods of terminological analysis when comparing the definitions of relevant terms. Statistical method has been used in order to generalise quantitative indicators chara
APA, Harvard, Vancouver, ISO, and other styles
38

Aphane, Mmabatho Portia. "Cybersecurity Awareness on Cybercrime Among the Youth in Gauteng Province." International Journal of Social Science Research and Review 6, no. 8 (2023): 23–32. http://dx.doi.org/10.47814/ijssrr.v6i8.1414.

Full text
Abstract:
The increased independence on Internet has raised growing concerns that cyber security is becoming difficult to maintain. Not only do businesses depend on the internet for all types of electronic transactions, but home users increasingly also experience the immense benefit of the internet especially during the COVID-19 pandemic. Cyber security awareness and education are central to any attempt to secure cyber space. In the education system, youth must be made aware of the possible attacks and types of intruders. The rapid growth in the use of cyber space is not matched by the necessary skills.
APA, Harvard, Vancouver, ISO, and other styles
39

Patel, Dhyan. "Cyber Security: Study on Attack, Threat, Vulnerability." International Journal for Research in Applied Science and Engineering Technology 12, no. 2 (2024): 1074–78. http://dx.doi.org/10.22214/ijraset.2024.58472.

Full text
Abstract:
Abstract: The main aim of this research is to examine the various aspects of cyber infrastructure, encompassing both hardware and software systems, networks, enterprise networks, intranets, and the occurrence of cyber intrusions. The paper intends to elucidate the significance of network intrusions and cyber-theft, along with delving into the factors contributing to the proliferation of cybercrime. Furthermore, it provides a comprehensive definition of cyber security and its role in addressing network intrusion and cyber theft, while also exploring the drivers behind the surge in cybercrime an
APA, Harvard, Vancouver, ISO, and other styles
40

Sareen, Dr Anshu, and Shubhangi Jasaiwal. "Need of cyber security education in modern times." International Journal of Multidisciplinary Trends 3, no. 2 (2021): 188–91. http://dx.doi.org/10.22271/multi.2021.v3.i2c.179.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ashraf M. Sharif, Amreen, and Jaflah Alammary. "Development of Cyber Security Awareness and Education Framework." International Journal of Computing and Digital Systems 17, no. 1 (2025): 1–13. https://doi.org/10.12785/ijcds/1571048308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Arockiavathy S, Antony, Kavitha R, and Aravind S. "Cyber Security Trends in Education: A Scientometric Study." International Research Journal of Multidisciplinary Scope 05, no. 02 (2024): 265–74. http://dx.doi.org/10.47857/irjms.2024.v05i02.0447.

Full text
Abstract:
This paper presents a study on the quantitative analysis of global research trends in cybersecurity in education, focusing on 136 documents published between 2018 and 2022 retrieved from the Web of Science database. Various quantitative indicators were calculated and tabulated, and different graphs were plotted to understand growth patterns, citations with H-Index, country-wise contributions, affiliations, and other aspects. The study found the United States of America has the highest number of publications on cybersecurity in education research. Based on this, the authors suggest that Indian
APA, Harvard, Vancouver, ISO, and other styles
43

Urbanovics, Anna, and Peter Sasvari. "Cyber Security Master's degrees in the United Kingdom: a comparative analysis." Central and Eastern European eDem and eGov Days 338 (July 15, 2020): 161–71. http://dx.doi.org/10.24989/ocg.338.13.

Full text
Abstract:
In today’s digitized world, where most of our activities are related to online platforms, the information security has become more essential than ever. Most countries have launched national strategies for the implementation of cyber security. In these, the education and training of information security professionals get particular roles. The National Cyber Security Centre created a common framework for cyber security education in the United Kingdom for the universities offering degrees in information security. The aim of this paper is to examine and compare the British cyber security degrees.
APA, Harvard, Vancouver, ISO, and other styles
44

Arina, Alexei. "Network Security Threats to Higher Education Institutions." Central and Eastern European eDem and eGov Days 341 (March 17, 2022): 323–33. http://dx.doi.org/10.24989/ocg.v341.24.

Full text
Abstract:
The Covid-19 pandemic has significantly changed the way higher education institutions (HEIs) operate around the world. Distance learning has become the unique opportunity that the process further education in conditions where most economic activities were put on hold. To ensure the quality of distance learning have been implemented and used extensively online learning platforms, applications, video conferencing and cloud computing facilities in HEIs. However, this has increased the threats to information security, so that in 2020, in the field of education in general, and HEIs in particular, t
APA, Harvard, Vancouver, ISO, and other styles
45

Custodio, Eunice Bondoc, and Gilbert Malawit Tumibay. "Cybersecurity for higher education institutions: adopting regulatory framework." Global Journal of Engineering and Technology Advances 2, no. 3 (2020): 016–21. https://doi.org/10.5281/zenodo.4467382.

Full text
Abstract:
Cybersecurity is defined as the protection of networks, data and systems in the cyberspace.&nbsp; It should have the ability to protect or defend an organization&rsquo;s use of cyberspace from any attack, conducted via cyberspace with the intention of disrupting, disabling, destroying, or maliciously controlling a computing environment and even destroying the integrity of the data or stealing controlled information. As the rapid technological developments have provided vast opportunities and potential sources of efficiency to every organization, these new technologies have also brought unprece
APA, Harvard, Vancouver, ISO, and other styles
46

Renaud, Karen, Basie Von Solms, and Rossouw Von Solms. "How does intellectual capital align with cyber security?" Journal of Intellectual Capital 20, no. 5 (2019): 621–41. http://dx.doi.org/10.1108/jic-04-2019-0079.

Full text
Abstract:
Purpose The purpose of this paper is to position the preservation and protection of intellectual capital as a cyber security concern. The paper outlines the security requirements of intellectual capital to help boards of directors (BoDs) and executive management teams to understand their responsibilities and accountabilities in this respect. Design/methodology/approach The research methodology is desk research. In other words, we gathered facts and existing research publications that helped us to define key terms, to formulate arguments to convince BoDs of the need to secure their intellectual
APA, Harvard, Vancouver, ISO, and other styles
47

Manić, Ljiljana, and Jovan Miljković. "Cyber security of the elderly." Bezbednost, Beograd 64, no. 3 (2022): 120–39. http://dx.doi.org/10.5937/bezbednost2203120m.

Full text
Abstract:
Increasing the share of the elderly in the total population and the increase of the average age of the population is a feature of the demographic picture of Serbia and a process that will continue in the years to come. Although the share of the elderly in the total population is high, their knowledge and use of digital technologies is lower compared to other categories of the population. As a result, people over the age of 65 are at greater risk of digital exclusion, which results in not only social exclusion but also difficult access to public services and the exercise of other rights. Apart
APA, Harvard, Vancouver, ISO, and other styles
48

Rai, Gulshan. "Instrumental in Setting up of the First Large Scale Education and Research Network in close Collaboration with the Leading Educational and Research Institutions Dr." Global Journal of Enterprise Information System 9, no. 3 (2017): 106. http://dx.doi.org/10.18311/gjeis/2017/17978.

Full text
Abstract:
Cyber security expert Gulshan Rai will now take charge as special secretary for cyber security as the first cyber security chief under the Prime Ministers Office. Before the current appointment he was heading the Computer Emergency Response Team (CERT) at the Department of electronics and information technology (DeitY). Rai’s appointment comes at a time when cyber security assumes importance in the backdrop of growing network intrusions and hacking attempts on not just businesses but also on the government.
APA, Harvard, Vancouver, ISO, and other styles
49

Urbanovics, Anna, and Péter Sasvári. "Az Egyesült Királyságban működő kiberbiztonsági képzésekbe bevont oktatók tudományos teljesítményének elemzése." Információs Társadalom 18, no. 3-4 (2019): 105. http://dx.doi.org/10.22503/inftars.xviii.2018.3-4.5.

Full text
Abstract:
A mai digitalizált világban, amelyben az ügyintézés jelentős része az online felületekhez köthető, az információs rendszerek biztonsága még hangsúlyosabbá vált. A kiberbiztonság megvalósítására több országban állami szinten készítettek átfogó stratégiát, amelyben kiemelkedő szerep jut a kiberbiztonsági szakemberek képzésének. Az Egyesült Királyságban működő Nemzeti Kiberbiztonsági Központ egységes képzési programot alkotott meg azon egyetemek számára, amelyek kiberbiztonságot oktatnak. A dolgozat célja, hogy a brit egyetemek kiberbiztonsági képzéseit vizsgálja és hasonlítsa össze egymással. Az
APA, Harvard, Vancouver, ISO, and other styles
50

Mednikarov, Boyan, Yuliyan Tsonev, Borislav Nikolov, and Andon Lazarov. "Characteristics and Components of the Cyber Hygiene as a Subclass of Cyber Security in Military Environment and Educational Issues." Strategies for Policy in Science and Education-Strategii na Obrazovatelnata i Nauchnata Politika 31, no. 2 (2023): 154–69. http://dx.doi.org/10.53656/str2023-2-3-cha.

Full text
Abstract:
In the present study based on the main characteristics and components of the cyber hygiene as a subclass of the cyber security, educational challenges on the cyber hygiene in military area are considered. Based on institutional experience in the scope of the cyber security in the digital environment, a sequence of activities to keep resilient and reliable cyber hygiene in army organizations are analyzed and recommended. Definitions of basic cyber hygiene characteristics are suggested. Cyber hygiene software issues and institutional information security controls are discussed. A malware infecti
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!