Toward a Cyber Security Adoption Framework for Primary and Secondary Education Providers
The necessity for strong cyber security controls in primary and secondary education is growing as schools are increasingly targeted by cyber-attacks. This paper discusses how the adoption of technology in primary and secondary schools bring associated security threats, and how security standards and...
| Main Authors: | Torres, Mason, Thompson, Nik |
|---|---|
| Format: | Conference Paper |
| Published: |
2020
|
| Online Access: | http://hdl.handle.net/20.500.11937/81764 |
Similar Items
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017)
by: Sani, Rozana
Published: (2017)
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017)
by: He, Qiyi, et al.
Published: (2017)
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012)
by: Parvin, Sazia, et al.
Published: (2012)
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
A Dynamic Cyber Terrorism Framework
by: Rabiah, Ahmad, et al.
Published: (2012)
by: Rabiah, Ahmad, et al.
Published: (2012)
Interplay between cyber supply chain risk management practices and cyber security performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
by: Gani, Anisha Banu Dawood, et al.
Published: (2022)
Cyber security in the open data: where is the equilibrium?
by: Zulhuda, Sonny
Published: (2017)
by: Zulhuda, Sonny
Published: (2017)
An overview on cyber security awareness in Muslim countries
by: Basamh, Saeed S., et al.
Published: (2014)
by: Basamh, Saeed S., et al.
Published: (2014)
Cyber Security Awareness Among Students In Ump
by: Nur Madihah, Mazlan
Published: (2023)
by: Nur Madihah, Mazlan
Published: (2023)
A comprehensive insight into game theory in relevance to cyber security
by: Anwar, Farhat, et al.
Published: (2020)
by: Anwar, Farhat, et al.
Published: (2020)
A systematic review of approaches to assessing cyber security awareness
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
by: Abd Rahim, Noor Hayani, et al.
Published: (2015)
A systematic literature review of mitigating cyber security risk
by: Kamarudin, Syafila, et al.
Published: (2023)
by: Kamarudin, Syafila, et al.
Published: (2023)
Cyber security and open government in Malaysia: issues and development
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Webinar Cyber security and IR 4.0 Awareness
by: Mritha, Ramalingam
Published: (2021)
by: Mritha, Ramalingam
Published: (2021)
Cyber warfare impact to national security - Malaysia experiences
by: Azian, Ibrahim, et al.
Published: (2019)
by: Azian, Ibrahim, et al.
Published: (2019)
Web-of-things framework for cyber-physical systems
by: Dillon, Tharam S., et al.
Published: (2010)
by: Dillon, Tharam S., et al.
Published: (2010)
Pesonal data governance in Malaysia from a cyber security perspective
by: Zulhuda, Sonny
Published: (2016)
by: Zulhuda, Sonny
Published: (2016)
Cyber security maturity model and Maqasid al-Shari'ah
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
by: M. Ridza, Nadwiyah, et al.
Published: (2018)
How to Cultivate Cyber Security Culture? The Evidences from Literature
by: Akhyari, Nasir, et al.
Published: (2023)
by: Akhyari, Nasir, et al.
Published: (2023)
UMP, CyberSecurity tingkat keupayaan pakar keselamatan siber
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Interplay between Supply Chain Visibility and Cyber Security Performance
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
by: Gani, Anisha Banu Dawood, et al.
Published: (2021)
Cyber security awareness: Is there any significant difference in demographic factors?
by: Sharkawi, Ismawati, et al.
Published: (2023)
by: Sharkawi, Ismawati, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Web-Based Reporting Vulnerabilities System for Cyber Security
Maintenance
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
by: Hamid Ali, Firkhan Ali, et al.
Published: (2023)
Cyber-physical systems: Providing Quality of Service (QoS) in a heterogeneous systems-of-systems environment
by: Dillon, T., et al.
Published: (2011)
by: Dillon, T., et al.
Published: (2011)
HIDDEN VIEWS ON HOMEWORK:
DO SOCIAL-NETWORKING SITES PROVIDE PARENTS WITH CYBER-AGENCY?
by: Lehner-Mear, Rachel
Published: (2017)
by: Lehner-Mear, Rachel
Published: (2017)
The Application of Mixed Method in Developing a Cyber
Terrorism Framework
by: Ahmad, Rabiah, et al.
Published: (2012)
by: Ahmad, Rabiah, et al.
Published: (2012)
Exploring cyber security behavioral practices among secondary school students following the MyDigital Maker Champion program in Putrajaya, Malaysia
by: Intan Diana, et al.
Published: (2024)
by: Intan Diana, et al.
Published: (2024)
Determinants and practices towards cyber supply chain performance with cyber supply chain visibility as a mediator
by: Anisha Banu, Dawood Gani
Published: (2022)
by: Anisha Banu, Dawood Gani
Published: (2022)
Cyber–information security compliance and violation behaviour in organisations: A systematic review
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
by: Sulaiman, Noor Suhani, et al.
Published: (2022)
Social media usage and awareness of cyber security issues among youths
by: Ahmad, F., et al.
Published: (2020)
by: Ahmad, F., et al.
Published: (2020)
Cyber security awareness levels in smartphone usage among UPM students
by: Kamarudin, Syafila
Published: (2024)
by: Kamarudin, Syafila
Published: (2024)
A cyber-consumer protection framework for prevention of online deceptive advertising
by: Al Adwan, Ahmad
Published: (2012)
by: Al Adwan, Ahmad
Published: (2012)
Does high e-government adoption assure stronger security? A cross-country analysis of Australia and Thailand.
by: Thompson, Nik, et al.
Published: (2019)
by: Thompson, Nik, et al.
Published: (2019)
National information infrastructure organisations and cyber security compliance in Malaysia / Maslina Daud
by: Maslina , Daud
Published: (2018)
by: Maslina , Daud
Published: (2018)
Similar Items
-
Securing cyber security at all fronts
by: Sani, Rozana
Published: (2017) -
A survey on cyber security of CAV
by: He, Qiyi, et al.
Published: (2017) -
Multi-cyber framework for availability enhancement of cyber physical systems
by: Parvin, Sazia, et al.
Published: (2012) -
Cyber Security Awareness Webinar Preparing
by: Mritha, Ramalingam
Published: (2021) -
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)