Cybersecurity in higher education: a bibliometric review

JR Orosco-Fabian* - Revista Digital de Investigación en Docencia …, 2024 - scielo.org.pe
Introduction: ICTs have impacted all sectors of society, especially in higher education, where
students are trained to enter the labor market, but will be mediated by these technologies …

West African online learning spaces security status and students' cybersecurity awareness level during COVID-19 lockdown

E Djeki, J Dégila, MH Alhassan - Education and Information Technologies, 2024 - Springer
COVID-19 has significantly impacted humankind's lifestyle since its emergence. Educational
institutions quickly adopted online courses to deal with its spread. Regrettably, the adoption …

Profile of generation Z characteristics: Implications for contemporary educational approaches

M Wajdi, B Susanto, MA Sutiarso… - Kajian Pendidikan, Seni …, 2024 - ojs.ympn2.or.id
Generation Z, comprised of individuals born between the late 1990s and early 2010s, has
become a subject of interest in discussions on social, cultural, and educational trends …

Teenagers: A Social Media Threat Vector

H Collier, C Morton - International …, 2024 - papers.academic-conferences.org
Social media has grown significantly since the early days. During this time, social media has
grown to be a mainstay in most teenagers' lives. Whether they are on Facebook, Snapchat …

Foundations of Cybersecurity: Core Principles, Practices, and Emerging Trends

A Gaurav, V Arya - Metaverse Security Paradigms, 2024 - igi-global.com
The rapid advancement of digital technology has brought significant benefits but also
introduced a myriad of cybersecurity challenges. In this context, this chapter, addresses the …

Investigating young entrepreneur's awareness of cybersecurity: A focus on student Start-Up projects

B Farid, AN Djalal, B Nawel - Economics and Management, 2024 - ceeol.com
This study investigates the level of cybersecurity awareness among young Algerian
entrepreneurs who founded start-ups within university ecosystems. These entrepreneurs are …

Strategies and Methods Used by Information Technology Security Professionals to Secure Cloud Access Infrastructure

O Fontem - 2024 - search.proquest.com
Cloud computing provides data storage and access services to end users and enterprises
but requires effective access controls to protect privileged information from unauthorized and …

[引用][C] Ciberseguridad en educación superior: una revisión bibliométrica

JR Orosco-Fabian* - Revista Digital …, 2024 - Universidad Peruana de Ciencias …