To see the other types of publications on this topic, follow the link: Cybersecurity in the educational environment.

Journal articles on the topic 'Cybersecurity in the educational environment'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Cybersecurity in the educational environment.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Буров, Олександр, Олександр Бутнік-Сіверський, Олена Орлюк, and Катерина Горська. "CYBERSECURITY AND INNOVATIVE DIGITAL EDUCATIONAL ENVIRONMENT." Information Technologies and Learning Tools 80, no. 6 (2020): 414–30. http://dx.doi.org/10.33407/itlt.v80i6.4159.

Full text
Abstract:
The article considers interaction of innovation, cybersecurity, and digital education environment. It has been demonstrated that comprehensive digitalization of society is being accompanied by changes in the innovative potential and educational needs of Ukraine, especially in the development of the human intellectual capital and its protection in the digital environment. Human capital in innovation plays a significant role, especially in the digital age. Young people are considered as a vulnerable group that could be the main goal of cyber cognitive operations and as the weakest link of the Sy
APA, Harvard, Vancouver, ISO, and other styles
2

Khalidov, Ali A. "CYBERSECURITY IN EDUCATIONAL ENVIRONMENT: TRAINING AND PRACTICE." EKONOMIKA I UPRAVLENIE: PROBLEMY, RESHENIYA 8/3, no. 147 (2024): 127–34. http://dx.doi.org/10.36871/ek.up.p.r.2024.08.03.015.

Full text
Abstract:
The article examines the importance of cybersecurity in the educational environment and the need to integrate relevant curricula. Particular attention is paid to the analysis of current cyber threats faced by educational institutions, and best practices for training students and staff in the skills to protect against these threats are discussed. The challenges and barriers to the implementation of cybersecurity education are described, and recommendations for overcoming these difficulties are offered.
APA, Harvard, Vancouver, ISO, and other styles
3

Самойленко, Олексій. "МЕТОДИЧНІ АСПЕКТИ ФОРМУВАННЯ ГОТОВНОСТІ БАКАЛАВРІВ З КІБЕРБЕЗПЕКИ ДО ПРОФЕСІЙНОЇ ДІЯЛЬНОСТІ ЗАСОБАМИ КОЛАБОРАТИВНОГО НАВЧАННЯ В УМОВАХ ОСВІТНЬО-ЦИФРОВОГО СЕРЕДОВИЩА". Педагогічні науки: теорія, історія, інноваційні технології, № 5-6(99-100) (31 серпня 2020): 137–49. http://dx.doi.org/10.24139/2312-5993/2020.05-06/137-149.

Full text
Abstract:
The article outlines the methodological aspects of forming the readiness of bachelors in cybersecurity for professional activities by means of collaborative learning in an educational and digital environment that can increase the level of their professional training. The readiness of a bachelor in cybersecurity for professional activity is outlined, which in essence is a selective and predictable activity of a bachelor in cybersecurity at the stage of its preparation for professional activity and arises from the moment of determining the purpose of activity on the basis of perceived needs and
APA, Harvard, Vancouver, ISO, and other styles
4

SAMOYLENKO, Alexey. "A CONSTRUCTIVE MODEL OF TRAINING BACHELORS IN CYBERSECURITY IN AN EDUCATIONAL-DIGITAL ENVIRONMENT." Cherkasy University Bulletin: Pedagogical Sciences, no. 2 (2020): 102–6. http://dx.doi.org/10.31651/2524-2660-2020-2-102-106.

Full text
Abstract:
The article presents a constructive model of training bachelors in cybersecurity in an educational-digital environment. The concepts of "model" and "modeling" are analyzed. The meaning of the definition of "construct" as a whole, distinguished from other entities of a certain area, which is inaccessible to direct observation, but hypothetically deduced and / or constructed logically on the basis of observed features, with a sufficient degree of experimentally and logically validated, is verified. the concept used to represent it. The scientific position in relation to the conceptual field of t
APA, Harvard, Vancouver, ISO, and other styles
5

Samoylenko, A. "RESEARCH OF EDUCATIONAL INFORMATION TOOLS FOR TRAINING BACHELORS IN CYBERSECURITY." Innovative Solution in Modern Science 5, no. 41 (2020): 35. http://dx.doi.org/10.26886/2414-634x.5(41)2020.3.

Full text
Abstract:
The article presents a study of the state of use of educational information for the preparation of bachelors in cybersecurity. The key bases of the legislative base of Ukraine are analyzed. Based on a number of studies of the use of the Internet in the process of training bachelors in cybersecurity, the state of perception of different types of educational information by future bachelors in cybersecurity and the use of device types in the training of bachelors in cybersecurity. bachelors in cybersecurity.The subject of the research is the issues related to the means for learning on the Interne
APA, Harvard, Vancouver, ISO, and other styles
6

SAMOYLENKO, Olexii. "TRAINING BACHELORS OF CYBERSECURITY IN CONDITIONS OF EDUCATIONAL-AND-DIGITAL MEDIUM BY MEANS OF NETWORK FACILITY FOR PROGRAMMING." Cherkasy University Bulletin: Pedagogical Sciences, no. 4 (2020): 38–42. http://dx.doi.org/10.31651/2524-2660-2020-4-38-42.

Full text
Abstract:
The article publishes the leading aspects of training bachelors in cybersecurity in an educational and digital environment by means of network simulators for programming. The concept of preparation for a bache- lor's degree in cybersecurity is clarified. communicative environment, timely detection, prevention and neutraliza- tion of real and potential threats to Ukraine's national security in cyberspace. It is determined that the training of a specialist with a bachelor's degree in cybersecurity is the right of modern professional activity in the system of state and commercial enterprises, whi
APA, Harvard, Vancouver, ISO, and other styles
7

Luaran, Johan @. Eddy, Nuramanina Binti Hishamudin, and Jasmine Jain. "Assessing Cybersecurity Awareness and Practices among Teachers in a Tech-Integrated Educational Environment in Cheras, Selangor." International Journal of Research and Innovation in Social Science IX, no. IV (2025): 6112–19. https://doi.org/10.47772/ijriss.2025.90400438.

Full text
Abstract:
This quantitative study assessed cybersecurity awareness and practices among secondary school teachers in an international school district in Cheras, Selangor. A structured questionnaire was administered to teachers using simple random sampling. Results revealed that while a majority of teachers demonstrated moderate awareness of cybersecurity risks associated with classroom technology, there was no significant difference in confidence levels or training received regarding cybersecurity threats and best practices between novice and experienced teachers. The study highlights the need for target
APA, Harvard, Vancouver, ISO, and other styles
8

Samoylenko, A. "RESEARCH ON THE PERCEPTION OF DIFFERENT TYPES OF EDUCATIONAL INFORMATION BY FUTURE BACHELORS IN CYBERSECURITY." Innovative Solution in Modern Science 3, no. 39 (2020): 63. http://dx.doi.org/10.26886/2414-634x.3(39)2020.6.

Full text
Abstract:
The article presents a study of the perception of different types of educational information by future bachelors in cybersecurity. The results of the study are characterized by the use of such types of information as audio (listen to audio), visual (watch video snippet), audio-visual (see video snippet with audio), presentations and electronic text without video or audio, as well as combinations all of these options. The subject of the research is the questions concerning the state of use of types of educational information in the educational environment in the process of preparation of bachel
APA, Harvard, Vancouver, ISO, and other styles
9

Olalekan L. A., Ogunjimi, Adebayo Patrick O., Adesanya Abel S, Alasiri Waid A., and Bamgbose Sadiq O. "INFORMATION SECURITY AND THE DEVELOPMENT OF EDUCATIONAL ENVIRONMENT OF THE 21ST CENTURY." World Journal of Education and Humanities 6, no. 5 (2024): p11. http://dx.doi.org/10.22158/wjeh.v6n5p11.

Full text
Abstract:
In the 21st century, information security has emerged as a critical concern for educational environments. This paper delves into the definition and scope of information security, highlighting its key principles and best practices. It underscores the relevance of robust information security measures for educational institutions, which face unique threats such as cybersecurity risks, data privacy issues, and security breaches. By examining real-world examples, the paper illustrates these threats and their potential impact. Strategies for enhancing information security in educational settings are
APA, Harvard, Vancouver, ISO, and other styles
10

Samoуlenko, Oleksiy. "Method of conducting video lectures and online broadcasting in the system of preparation of bachelors from cyber security in the conditions of educational digits." Pedagogìčnij časopis Volinì 1(16), no. 2020 (2020): 80–84. http://dx.doi.org/10.29038/2415-8143-2020-01-80-84.

Full text
Abstract:
The article presents the method of conducting video lectures and online broadcasts in the system of training bachelors in cybersecurity in an educational and digital environment. It is determined that professional training of personnel in various industries in the modern world is an extremely important task of the state. Its solution becomes significant depending on how close these or those specialists are to the sphere of society. The meaning of the concept of "training" is defined, which is defined as a set of special knowledge, skills, qualities, work experience and norms of behavior that p
APA, Harvard, Vancouver, ISO, and other styles
11

Buriachok, Volodymyr, Nataliia Korshun, Svitlana Shevchenko, and Pavlo Skladannyi. "APPLICATION OF NI MULTISIM ENVIRONMENT IN THE PRACTICAL SKILLS BUILDING FOR STUDENTS OF 125 "CYBERSECURITY" SPECIALTY." Cybersecurity: Education, Science, Technique 1, no. 9 (2020): 159–69. http://dx.doi.org/10.28925/2663-4023.2020.9.159169.

Full text
Abstract:
The article is devoted to the problem of practical skills building and development of students majoring in 125 "Cybersecurity". An analysis of the professional competencies of future cybersecurity professionals, in particular, related to technical protection of information. It is proved that the use of virtual laboratories in the educational process helps to increase the efficiency of the educational process and allows to form and improve the professional competencies of the future cybersecurity engineer. Education becomes practice-oriented. The possibilities of a virtual laboratory workshop b
APA, Harvard, Vancouver, ISO, and other styles
12

Researcher. "CYBERSECURITY IN EDUCATION: SAFEGUARDING DIGITAL LEARNING ENVIRONMENTS." International Journal of Engineering and Technology Research (IJETR) 9, no. 2 (2024): 43–53. https://doi.org/10.5281/zenodo.13645990.

Full text
Abstract:
This article examines the evolving landscape of cybersecurity in education, focusing on the challenges and opportunities presented by the rapid digitalization of learning environments. It explores the increasing frequency and sophistication of cyber threats targeting educational institutions, the financial implications of data breaches, and the critical need for robust security measures. The article discusses key areas, including the transformation of digital classrooms, the role of AI in threat detection and prevention, data security and student privacy protection, the importance of building
APA, Harvard, Vancouver, ISO, and other styles
13

Pirta-Dreimane, Rūta, Andrejs Romanovs, Jana Bikovska, et al. "Enhancing Smart Grid Resilience: An Educational Approach to Smart Grid Cybersecurity Skill Gap Mitigation." Energies 17, no. 8 (2024): 1876. http://dx.doi.org/10.3390/en17081876.

Full text
Abstract:
Cybersecurity competencies are critical in the smart grid ecosystem, considering its growing complexity and expanding utilization. The smart grid environment integrates different sensors, control systems, and communication networks, thus augmenting the potential attack vectors for cyber criminals. Therefore, interdisciplinary competencies are required from smart grid cybersecurity specialists. In the meantime, there is a lack of competence models that define the required skills, considering smart grid job profiles and the technological landscape. This paper aims to investigate the skill gaps a
APA, Harvard, Vancouver, ISO, and other styles
14

Samoylenko, A. "THE STUDY OF THE STATE OF INTERNET USE IN THE PROCESS OF TRAINING BACHELORS IN CYBERSECURITY." Innovative Solution in Modern Science 4, no. 40 (2020): 87. http://dx.doi.org/10.26886/10.26886/2414-634x.4(40)2020.7.

Full text
Abstract:
The article presents a study of the state of Internet usage in the process of professional training of cybersecurity bachelors. The concept of preparation has been clarified. The problems related to the security of cyberspace are characterized. The subject of research is the frequency of use of the Internet in the process of professional training of cybersecurity bachelors, namely questions related to the frequency of search of educational information on the Internet and its type and perception, the use of the online educational environment in the preparation of bachelors in cybersecurity in t
APA, Harvard, Vancouver, ISO, and other styles
15

Dei, H. A. "IMPROVING DIGITAL COMPETENCE OF EDUCATIONAL STAFF AS A FACTOR OF CYBERSECURITY IN THE EDUCATIONAL ENVIRONMENT." Public management and administration in Ukraine, no. 46 (2025): 119–24. https://doi.org/10.32782/pma2663-5240-2025.46.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Esenalieva, Gulzat. "CYBER SECURITY IN THE EDUCATION SYSTEM." Alatoo Academic Studies 2022, no. 1 (2022): 167–71. http://dx.doi.org/10.17015/aas.2022.221.21.

Full text
Abstract:
In the modern educational process, the field of informatization and cybersecurity threats is of great relevance today. It should be noted that informatization processes and cybersecurity problems in the educational environment are interconnected. The rapid development of information technologies and widespread digitalization has seen a trend of large-scale application in the field of education of new ways of communication, organization of the educational process, and knowledge control. A number of problems that have been observed recently in the process of using information technologies in the
APA, Harvard, Vancouver, ISO, and other styles
17

Watini, Sri, George Davies, and Nicole Andersen. "Cybersecurity in Learning Systems: Data protection and privacy in educational information systems and digital learning environments." International Transactions on Education Technology (ITEE) 3, no. 1 (2024): 26–35. http://dx.doi.org/10.33050/itee.v3i1.665.

Full text
Abstract:
This research addresses the growing cybersecurity challenges within educational information systems and digital learning platforms, focusing on the protection of sensitive data and user privacy. The objective is to identify prevalent cybersecurity threats in these environments and propose effective solutions to mitigate them. A mixed-method approach is employed, combining a comprehensive literature review with a survey distributed to IT professionals and educators working in digital learning environments. The findings highlight the increasing sophistication of cyberattacks, including data brea
APA, Harvard, Vancouver, ISO, and other styles
18

Bulai, Rodica, Dinu Țurcanu, and Dumitru Ciorbă. "Education in Cybersecurity." Central and Eastern European eDem and eGov Days 335 (March 17, 2022): 33–44. http://dx.doi.org/10.24989/ocg.v335.2.

Full text
Abstract:
The article addresses education as the smartest investment in cybersecurity. One of the most intriguing findings is that 95% of security incidents involve human errors. Most security attacks are concerned with human weakness to attract victims and persuade them to give involuntary access to personal and sensitive information. To eliminate errors caused by social engineering and negligence and to increase users’ awareness of the threats, technologies and services should be combined with education. Education in the field of cybersecurity is a necessary consideration for both individuals and fami
APA, Harvard, Vancouver, ISO, and other styles
19

Horlichenko, Serhii, and Anastasiia Horlichenko. "Mathematical model for optimising the contemporary process of training specialists in the field of cybersecurity and information protection." Collection "Information Technology and Security" 12, no. 2 (2024): 210–18. https://doi.org/10.20535/2411-1031.2024.12.2.315740.

Full text
Abstract:
The article examines current issues of training cybersecurity specialists, which are of particular importance in the context of rapid development of information technology and the growing number of cyber threats. It is noted that in Ukraine, as in many other countries, there are problems related to the organisation and management of the process of training such specialists. Traditional teaching methods do not always correspond to the specifics of the rapidly changing cyber environment, which makes it difficult for graduates to adapt to real working conditions. There is also a lack of uniform m
APA, Harvard, Vancouver, ISO, and other styles
20

OLUMIDE, Longe, and Talabi ADEDOYIN. "Strengthening the digital learning environment: integrating cybersecurity risk management and data protection methodologies." Region - Educational Research and Reviews 5, no. 6 (2024): 28. http://dx.doi.org/10.32629/rerr.v5i6.1450.

Full text
Abstract:
Digital learning refers to the use of technology in learning that involves the use of at least a piece of technology like a laptop. The adoption of digital technologies and resultant transformation of organizations were accelerated in part by COVID-19 pandemic but have attracted cybersecurity criminals and hackers who want to gain unauthorized access to personal data, sensitive personal data like financial and health information to commit fraud or cybercrime. The objective of the paper is to raise awareness for active cybersecurity risk management and data privacy compliance, especially in edu
APA, Harvard, Vancouver, ISO, and other styles
21

Cigoj, Primož, and Borka Jerman Blažič. "An Advanced Educational Tool for Digital Forensic Engineering." International Journal of Emerging Technologies in Learning (iJET) 11, no. 03 (2016): 15. http://dx.doi.org/10.3991/ijet.v11i03.5294.

Full text
Abstract:
This paper presents a novel approach to education in the area of digital forensics based on a multi-platform cloud-computer infrastructure and an innovative computer based tool. The tool is installed and available through the cloud-based infrastructure of the Dynamic Forensic Education Alliance. Cloud computing provides an efficient mechanism for a wide range of services that offer real-life environments for teaching and training cybersecurity and digital forensics. The cloud-based infrastructure, the virtualized environment and the developed educational tool enable the construction of a dynam
APA, Harvard, Vancouver, ISO, and other styles
22

Parfonova, Iryna, and Oleksandra Zinchenko. "COUNTERING CYBER THREATS IN THE CONTEXT OF DIGITAL EDUCATIONAL TECHNOLOGIES IN THE HIGHER EDUCATION SYSTEM OF UKRAINE." Scientific Journal of Polonia University 67, no. 6 (2025): 230–38. https://doi.org/10.23856/6729.

Full text
Abstract:
The article is dedicated to analyzing the implementation of distance learning in higher education institutions in Ukraine, as well as the challenges and prospects associated with this process. It discusses the main distance learning platforms used in Ukrainian higher education institutions such as Moodle, Google Classroom, Microsoft Teams, Coursera, EdX, Prometheus, and the National Distance Learning Platform. Each of these platforms has its own features and advantages, ensuring accessibility and flexibility in education for students and educators. In addition to the advantages of distance lea
APA, Harvard, Vancouver, ISO, and other styles
23

Pattanayak, Animesh, Stu Steiner, and Daniel Conte de Leon. "Hands-on Educational Labs for Cyber Defense Competition Training." Journal of The Colloquium for Information Systems Security Education 9, no. 1 (2022): 8. http://dx.doi.org/10.53735/cisse.v9i1.144.

Full text
Abstract:
Cyber Defense Competitions provide students with challenging, hands-on, fun, and close to real world opportunities to learn, practice, and perform tasks that they will be expected to complete as cybersecurity professionals. The current availability of training resources focused on Cyber Defense Competitions is limited. We introduce CYOTEE: CYbersecurity Oriented Training Environment and Exercises. CYOTEE provides a set of nine fully modifiable and freely available hands-on laboratory activities intended to help students gain skills needed to be successful at Cyber Defense Competitions. This ar
APA, Harvard, Vancouver, ISO, and other styles
24

Ortiz-Garcés, Iván, Jaime Govea, Santiago Sánchez-Viteri, and William Villegas-Ch. "CyberEduPlatform: an educational tool to improve cybersecurity through anomaly detection with Artificial Intelligence." PeerJ Computer Science 10 (June 14, 2024): e2041. http://dx.doi.org/10.7717/peerj-cs.2041.

Full text
Abstract:
Cybersecurity has become a central concern in the contemporary digital era due to the exponential increase in cyber threats. These threats, ranging from simple malware to advanced persistent attacks, put individuals and organizations at risk. This study explores the potential of artificial intelligence to detect anomalies in network traffic in a university environment. The effectiveness of automatic detection of unconventional activities was evaluated through extensive simulations and advanced artificial intelligence models. In addition, the importance of cybersecurity awareness and education
APA, Harvard, Vancouver, ISO, and other styles
25

Jerman Blažič, Borka, and Andrej Jerman Blažič. "Cybersecurity Skills among European High-School Students: A New Approach in the Design of Sustainable Educational Development in Cybersecurity." Sustainability 14, no. 8 (2022): 4763. http://dx.doi.org/10.3390/su14084763.

Full text
Abstract:
Cybersecurity has increasingly become a headline feature in news media in recent years, generally prompted by spectacular security breaches in various information systems. The importance of cybersecurity awareness for the sustainable development of society is now recognized widely, but the problem of how to build an educational ecosystem which will include the most relevant target audiences that need to develop cybersecurity skills, is not yet solved. This paper elaborates the state of cybersecurity skills and knowledge in European high-school students by collecting data from the students, the
APA, Harvard, Vancouver, ISO, and other styles
26

Arnold, David, John Ford, and Jafar Saniie. "Architecture of an Efficient Environment Management Platform for Experiential Cybersecurity Education." Information 16, no. 7 (2025): 604. https://doi.org/10.3390/info16070604.

Full text
Abstract:
Testbeds are widely used in experiential learning, providing practical assessments and bridging classroom material with real-world applications. However, manually managing and provisioning student lab environments consumes significant preparation time for instructors. The growing demand for advanced technical skills, such as network administration and cybersecurity, is leading to larger class sizes. This stresses testbed resources and necessitates continuous design updates. To address these challenges, we designed an efficient Environment Management Platform (EMP). The EMP is composed of a set
APA, Harvard, Vancouver, ISO, and other styles
27

ARAUJO MACEDO, Claudia, and Jos MENTING. "Building a Cybersecurity Culture in the Industrial Control System Environment." International Journal of Information Security and Cybercrime 8, no. 1 (2019): 39–44. http://dx.doi.org/10.19107/ijisc.2019.01.05.

Full text
Abstract:
Cybersecurity in industrial control system environments has become a significant concern and is even more relevant in the context of critical infrastructures where control system disruption could have a profound impact on health, safety and the environment. This makes this type of system a major target for malicious activities. Notwithstanding an organization’s interest in protecting its industrial control systems against cyber-attacks, the implementation of security measures, whether technical, organizational or human, still faces resistance and is often seen as a constraint. Using the best t
APA, Harvard, Vancouver, ISO, and other styles
28

Delgado, Ismael, Elio Sancristobal, Sergio Martin, and Antonio Robles-Gómez. "Exploring IoT Vulnerabilities in a Comprehensive Remote Cybersecurity Laboratory." Sensors 23, no. 22 (2023): 9279. http://dx.doi.org/10.3390/s23229279.

Full text
Abstract:
With the rapid proliferation of Internet of things (IoT) devices across various sectors, ensuring robust cybersecurity practices has become paramount. The complexity and diversity of IoT ecosystems pose unique security challenges that traditional educational approaches often fail to address comprehensively. Current curricula may provide theoretical knowledge but typically lack the practical components necessary for students to engage with real-world cybersecurity scenarios. This gap hinders the development of proficient cybersecurity professionals capable of securing complex IoT infrastructure
APA, Harvard, Vancouver, ISO, and other styles
29

Chicone, Rhonda, Tina Marie Burton, and Julie A. Huston. "Using Facebook's Open Source Capture the Flag Platform as a Hands-on Learning and Assessment Tool for Cybersecurity Education." International Journal of Conceptual Structures and Smart Applications 6, no. 1 (2018): 18–32. http://dx.doi.org/10.4018/ijcssa.2018010102.

Full text
Abstract:
There is a high demand for skilled cybersecurity professionals, however, entry-level employees and college graduates often lack the hands-on and real-world experience they need to be successful in the cybersecurity industry. This high demand has led educators to pursue innovative and smart application technologies as a way for students to gain hands-on skills and to practice those skills in a safe and fun environment. Cybergames are now being used by educational institutions and in private and public industry sectors. One popular game in the cybersecurity space is called Capture the Flag (CTF)
APA, Harvard, Vancouver, ISO, and other styles
30

Abd Rahman, Noor Haslindawati, Md Zawawi Abu Bakar, and Zalmizy Husin. "Unveiling the Dynamics of Cybersecurity Awareness and Exploring Influential Factors for Enhanced Vigilance: A Systematic Literature Review." Journal of Advanced Research in Applied Sciences and Engineering Technology 61, no. 2 (2024): 48–62. https://doi.org/10.37934/araset.61.2.4862.

Full text
Abstract:
Cybersecurity threats are spreading worldwide, targeting unsuspecting individuals and leading to substantial financial and emotional hardships. While general cybersecurity awareness has been studied extensively, there is a discernible gap in the literature focusing on the dynamics of cybersecurity awareness. Therefore, this systematic literature review aims to elucidate influential factors that can boost vigilance against cybersecurity threats. Adhering to the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) guidelines, 29 articles had been meticulously reviewed. The
APA, Harvard, Vancouver, ISO, and other styles
31

Samoilenko, O. O. "METHODOLOGICAL APPROACHES TO THE PREPARATION OF BACHELORS IN CYBERSECURITY IN AN EDUCATIONAL-DIGITAL ENVIRONMENT." Innovate Pedagogy 3, no. 22 (2020): 95–98. http://dx.doi.org/10.32843/2663-6085/2020/22-3.19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Prof., Shaheen Shaikh. "CYBERSECURITY AWARENESS AMONG STUDENTS: A RESEARCH REVIEW." Scholarly Research Journal for Interdisciplinary studies 13, no. 87 (2025): 211–18. https://doi.org/10.5281/zenodo.15148374.

Full text
Abstract:
<em>The incorporation of digital technology in education has increased students' exposure to cyber threats, making cybersecurity awareness a critical concern. This literature review examines students' awareness of cyber threats, prevalent vulnerabilities, and the efficacy of educational interventions. The findings indicate that while students grasp basic risks, their cybersecurity practices are inconsistent and often render them susceptible to phishing, social engineering, and ransomware attacks. Common perilous practices encompass password reuse, neglecting software updates, and carelessly ac
APA, Harvard, Vancouver, ISO, and other styles
33

Bolatbek, Milana, Gulshat Baispay, Shynar Mussiraliyeva, and Assel Usmanova. "A framework for detection and mitigation of cyber criminal activities using university networks in Kazakhstan." Radioelectronic and Computer Systems 2024, no. 2 (2024): 186–202. http://dx.doi.org/10.32620/reks.2024.2.15.

Full text
Abstract:
Abstract. The increasing number of information security incidents in higher education underscores the urgent need for robust cybersecurity measures. This paper proposes a comprehensive framework designed to analyze the illegal use of internet resources in university networks in Kazakhstan. The subject of this article is the detection and mitigation of cybercriminal activities using university networks in Kazakhstan. The goal is to develop a comprehensive framework that integrates multiple educational organizations to enhance collaborative security efforts by monitoring network activity and cat
APA, Harvard, Vancouver, ISO, and other styles
34

Gibbs, Tanya. "Seeking economic cyber security: a Middle Eastern example." Journal of Money Laundering Control 23, no. 2 (2020): 493–507. http://dx.doi.org/10.1108/jmlc-09-2019-0076.

Full text
Abstract:
Purpose The transformation of the United Arab Emirates (UAE) into an important global economic player has been accompanied by digitalization that has also left it at a risk to cybercrime. Concurrent with the rise in technology use, the UAE fast became one of the most targeted countries in the world. The purpose of this paper is to discuss how the UAE has tried to cope with accelerating levels of cyber threat using legislative and regulatory efforts as well as public- and private-sector initiatives meant to raise cybersecurity awareness. Design/methodology/approach The paper surveys the UAE’s c
APA, Harvard, Vancouver, ISO, and other styles
35

Puchkov, Oleksandr, and Оlena Uvarkina. "Sustainable development of the system of formal cyber education: reflection of modern concepts." Collection "Information Technology and Security" 11, no. 1 (2023): 60–68. http://dx.doi.org/10.20535/2411-1031.2023.11.1.283635.

Full text
Abstract:
The article defines the conceptual framework for sustainable development of the formal cyberworld system. An analysis of contemporary regulatory, legal, and scientific sources on the preparation of cyber specialists for the security and defense sector has been conducted. The main research methods identified are synthesis, comparative analysis, focusing method, and cause-and-effect method. The new U.S. Cybersecurity Strategy addressing cyber education issues has been analyzed, which sets new requirements for cyber professionals in the context of the transformation of the global and national sec
APA, Harvard, Vancouver, ISO, and other styles
36

Sabillon, Regner, Juan Ramon Bermejo Higuera, Jeimy Cano, Javier Bermejo Higuera, and Juan Antonio Sicilia Montalvo. "Assessing the Effectiveness of Cyber Domain Controls When Conducting Cybersecurity Audits: Insights from Higher Education Institutions in Canada." Electronics 13, no. 16 (2024): 3257. http://dx.doi.org/10.3390/electronics13163257.

Full text
Abstract:
This study validates a comprehensive cybersecurity audit model through empirical analysis in three higher education institutions in Canada. The research aims to enhance cybersecurity resilience by assessing the effectiveness of cybersecurity controls across diverse educational environments. Given the increasing frequency and sophistication of cyberattacks targeting educational institutions, this research is essential to ensure the protection of sensitive academic and personal data. Data were collected through detailed audits involving system vulnerabilities, compliance with security policies,
APA, Harvard, Vancouver, ISO, and other styles
37

Javadov, Ilkin. "AI-Driven Cybersecurity Strategies for Educational Platforms: Toward Transparent and Resilient Learning Environments." International Journal of Science and Research (IJSR) 14, no. 5 (2025): 265–68. https://doi.org/10.21275/sr25502120520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Tashkov, Dimitar, Elitsa Pavlova, Veselina Gagamova, and Violeta Vasileva. "Analysis of Cybersecurity Training Platforms and Simulation Environments and Opportunities for Their Integration Into Higher Education." International conference KNOWLEDGE-BASED ORGANIZATION 31, no. 3 (2025): 177–81. https://doi.org/10.2478/kbo-2025-0094.

Full text
Abstract:
Abstract Cybersecurity training is gaining key importance in the context of growing threats in cyberspace. Educational institutions are looking for effective methods for providing theoretical and practical knowledge in cybersecurity. This report examines the challenges universities face in building educational programs and highlights the importance of popular platforms that can be integrated into bachelor’s and master’s programs. Attention is drawn to the need for cooperation between the academic community, business and government institutions to build a comprehensive strategy for the developm
APA, Harvard, Vancouver, ISO, and other styles
39

Bullee, Jan-Willem, and Luka Koning. "Cybersecurity on the Move: Investigating the Efficacy of a Movable Escape Room as an Educational Tool for Healthcare Employees." European Conference on Games Based Learning 18, no. 1 (2024): 525–33. http://dx.doi.org/10.34190/ecgbl.18.1.2631.

Full text
Abstract:
This research investigates the effectiveness of a cybersecurity escape room as an educational intervention to increase awareness of cybersecurity risks towards a safer work environment. The escape room aims to educate participants and cybersecurity and to make them more resilient against various cyberthreats. Method: To validate the effectiveness, a pre-test-post-test design with 96 participants was conducted, 42 also completing a delayed post-test and 29 participants served as a control group. All participants were healthcare professionals. Using the HAIS-Q, six themes were investigated (name
APA, Harvard, Vancouver, ISO, and other styles
40

Sadiqzade, Zarifa, and Hasan Alisoy. "Cybersecurity and Online Education – Risks and Solutions." Luminis Applied Science and Engineering 2, no. 1 (2025): 4–12. https://doi.org/10.69760/lumin.20250001001.

Full text
Abstract:
The swift proliferation of online education has transformed learning, providing accessibility, flexibility, and creativity. This transition has also engendered considerable cybersecurity threats, encompassing data breaches, identity theft, phishing schemes, and privacy issues. As educational institutions increasingly depend on digital platforms and cloud-based systems, they become attractive targets for cyber threats. This study examines the principal cybersecurity threats in e-learning settings, including illegal data access, malware infection, and ethical issues related to student surveillan
APA, Harvard, Vancouver, ISO, and other styles
41

Joyce, Randall, Faris Sahawneh, and Brandon Dixon. "Developing a Cybersecurity Educational Community Using Discord During the COVID-19 Pandemic." Journal of the Southern Association for Information Systems 9, no. 2 (2022): 48–59. http://dx.doi.org/10.17705/3jsis.00026.

Full text
Abstract:
The COVID-19 pandemic has been a hectic time for faculty at the higher education and K-12 levels. With many institutions having to switch to remote learning, faculty had to find tools and resources that could be used to create virtual educational communities. In this milieu of remote learning, the technology tools must foster a thriving educational environment and facilitate communications. In the undergraduate Cybersecurity and Network Management (CNM) program at Murray State University (MSU), the faculty adopted Discord for teaching classes, lab work, and for social events. Discord has been
APA, Harvard, Vancouver, ISO, and other styles
42

Sapohov, Mykyta. "The characteristics of the educational and digital environment of US universities." Педевтологія 2, no. 1 (2024): 51–58. https://doi.org/10.31652/3041-1203-2024(1)-51-58.

Full text
Abstract:
The article examines the educational and digital environment of U.S. universities as a complex and multifaceted system that integrates modern digital technologies, infrastructure, and innovative approaches to education. The primary components of this environment include digital infrastructure, Learning Management Systems, Massive Open Online Courses, as well as tools such as Artificial Intelligence and Virtual Reality. These technologies enable personalized learning, enhance student-faculty interaction, and simplify access to educational resources regardless of geographical location. The analy
APA, Harvard, Vancouver, ISO, and other styles
43

Mahatab, Satyajit, Ramesh Chandra Sahoo, and Pankaj Kumar Dhal. "Enhancing Cybersecurity Awareness through Training and Educational Programs for Schools and Colleges in Remuna Tehsil, Balasore District, Odisha." International Journal of Integrative Research 3, no. 5 (2025): 329–42. https://doi.org/10.59890/ijir.v3i5.25.

Full text
Abstract:
In the contemporary digital landscape, the increasing integration of technology in educational and workplace settings has led to a heightened exposure to cyber risks. This study investigates the implementation of mass cybersecurity awareness initiatives through structured training and educational programs conducted across various schools, colleges, and workplaces in Remuna Tehsil, Balasore District, Odisha. The intervention targeted key educational institutions, including St. Thomas Convent School, Tundra High School, Saraswati Sishu Mandira, Bhimpura High School, Bhagabat Gosain High School,
APA, Harvard, Vancouver, ISO, and other styles
44

Katsantonis, Menelaos, and Ioannis Mavridis. "Evaluation of HackLearn COFELET Game User Experience for Cybersecurity Education." International Journal of Serious Games 8, no. 3 (2021): 3–24. http://dx.doi.org/10.17083/ijsg.v8i3.437.

Full text
Abstract:
HackLearn is a scenario-based hacking simulation game for teaching cybersecurity concepts while providing hands-on hacking experiences to the learners. HackLearn design is based on the COFELET framework, which assimilates modern learning theories, well-known cybersecurity standards, and built-in scaffolding and assessment features. Aiming at evaluating the user experience perceived by HackLearn’s users, we describe the process of adopting it in a real educational environment based on the didactic framework for simulation games. Additionally, we present the evaluation methodology elaborated, ba
APA, Harvard, Vancouver, ISO, and other styles
45

Peretyaha, Liudmyla, and Romana Sirenko. "CREATION OF AN INCLUSIVE VIRTUAL EDUCATIONAL ENVIRONMENT UTILIZING ARTIFICIAL INTELLIGENCE TECHNOLOGIES." Scientific Journal of Polonia University 68, no. 1 (2025): 121–26. https://doi.org/10.23856/6814.

Full text
Abstract:
The article provides a comprehensive analysis of the role of artificial intelligence (AI) in modern education. The authors explore how AI can be used to automate routine tasks of teachers, create personalized curricula for each student, create an adaptive learning environment, and provide effective feedback. It has been established that inclusion is an integral part of the educational policy of many countries, including Ukraine. However, despite significant achievements, inclusive education still faces a number of challenges related to insufficient funding, lack of proper training of teaching
APA, Harvard, Vancouver, ISO, and other styles
46

Chibunna, Ubamadu Bright, Oladimeji Hamza, Anuoluwapo Collins, James Paul Onoja, Adeoluwa Eweja, and Andrew Ifesinachi Daraojimba. "Building Digital Literacy and Cybersecurity Awareness to Empower Underrepresented Groups in the Tech Industry." International Journal of Multidisciplinary Research and Growth Evaluation. 1, no. 1 (2020): 125–38. https://doi.org/10.54660/.ijmrge.2020.1.1.125-138.

Full text
Abstract:
The tech industry’s rapid evolution has highlighted the critical need for digital literacy and cybersecurity awareness, particularly among underrepresented groups. These groups often face systemic barriers, such as limited access to resources, educational inequities, and biases, which hinder their ability to navigate the increasingly digital workplace securely and effectively. This study proposes a framework for building digital literacy and fostering cybersecurity awareness to empower individuals from underrepresented backgrounds, enabling them to thrive in the tech sector. The framework emph
APA, Harvard, Vancouver, ISO, and other styles
47

Kozubtsov, Ihor, Nataliia Zinchenko, Andrei Kotenko, and Ihor Averichev. "Problems of ensuring information security by subjects of educational activity in the digital educational and scientific environment of educational institutions." Smart technologies: Industrial and Civil Engineering 2, no. 15 (2024): 56–65. https://doi.org/10.32347/st.2024.2.1204.

Full text
Abstract:
The article discusses the current problems of ensuring information security by educational entities in the digital educational and scientific environment of educational institutions. In times of war (emergencies, pandemics), the educational activities of subjects are moving to the digital educational and scientific environment of educational institutions, where they have proven themselves effectively. Since all educational processes of educational institutions are information-based, and their distortion can lead to negative consequences, there is a need to ensure information security. Based on
APA, Harvard, Vancouver, ISO, and other styles
48

Alrobaian, Shouq, Saif Alshahrani, and Abdulaziz Almaleh. "Cybersecurity Awareness Assessment among Trainees of the Technical and Vocational Training Corporation." Big Data and Cognitive Computing 7, no. 2 (2023): 73. http://dx.doi.org/10.3390/bdcc7020073.

Full text
Abstract:
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and flow have increased rapidly and effectively; however, due to this increase, new electronic risks, or so-called cybercrime, such as phishing, scams, and hacking, lead to privacy breaches and hardware sabotage. Therefore, ensuring data privacy is vital, particularly in an educational institute where students constitute the large majority of user
APA, Harvard, Vancouver, ISO, and other styles
49

Andria, Andria, Ridam Dwi Laksono, Kelik Sussolaikah, Siti Rafidah M-Dawam, Mazura Mat Din, and Shaifizat Mansor. "BRIDGING THE GAPS: EVALUATING CYBERSECURITY AWARENESS AND PRACTICES FOR ENHANCED DIGITAL SECURITY." Journal of Information System and Technology Management 10, no. 38 (2025): 202–10. https://doi.org/10.35631/jistm.1038013.

Full text
Abstract:
Cybersecurity threats become a normal phenomenal in our daily life due to the advancement of Internet technology and the widespread use of it. To mitigate the risk aside from the advantages of these technology, one of the ways is to educate the users. In this preliminary study we evaluate cybersecurity awareness, practices, and preparedness among respondents, focusing on their knowledge of fundamental concepts, adherence to institutional policies, and incident response capabilities. There are 35 respondents who are among the schoolteachers who taught basic computer subject in various secondary
APA, Harvard, Vancouver, ISO, and other styles
50

Joseph, Jude Dominique. "Increasing Diversity in Cybersecurity." International Journal of Information Systems and Social Change 16, no. 1 (2025): 1–19. https://doi.org/10.4018/ijissc.381680.

Full text
Abstract:
The underrepresentation of people of color in cybersecurity and science, technology, engineering, and mathematics (STEM) is a persistent challenge with multifaceted implications. Addressing this issue requires a comprehensive understanding of the barriers to entry and effective strategies for engaging students of color in these disciplines. This article explores various approaches, policies, and initiatives to foster interest and participation in cybersecurity among students of color. This article draws upon theoretical frameworks and research to examine cultural perceptions, social factors, e
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!