Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
further education
biblio
Relating Factors of Tertiary Institution Students’ Cybersecurity Behavior
Submitted by grigby1 on Tue, 03/30/2021 - 12:03pm
Internet skills
validated cybersecurity factors
tertiary institutions students
tertiary institution students
SPSS version 25
security self-efficacy
security of data
security
response efficacy
pubcrawl
perceived vulnerability
perceived severity
perceived benefits
perceived barriers
peer behavior
computer skills
Internet exposure
internet
Human Factors
Human behavior
further education
cybersecurity training
cybersecurity issues
cybersecurity behaviors of tertiary institution students
cybersecurity behaviors
cybersecurity behavioral factors
Cybersecurity
cues to action
Correlation analysis
biblio
Increasing Participation and Security in Student Elections through Online Voting: The Case of Kabarak University
Submitted by grigby1 on Tue, 03/09/2021 - 3:04pm
online access
voting processes
three factor authentication
testing
student elections management
security
secure online voting system
Scalability
resultant system
Resiliency
resilience
pubcrawl
politics
password
Participation
online voting
authentication
offline electronic voting system
Mobile handsets
Metrics
Kabarak University
internet
Human behavior
further education
Electronic voting systems
electronic voting
Electronic mail
Educational institutions
e-voting systems
Dynamic Systems Development Methodology (DSDM)
campus hall voting
BIOS
biblio
Data Anonymization: K-anonymity Sensitivity Analysis
Submitted by grigby1 on Thu, 01/28/2021 - 2:01pm
pubcrawl
Human behavior
k-anonymity
k-anonymity sensitivity analysis
local authorities
Metrics
open government data
personal data privacy
personal data protection
government data processing
resilience
Resiliency
sensitivity analysis
Social Justice
Sociology
Statistics
tools
anonymity
GDPR
further education
European General Data Protection Regulation
education
digitization process
data usability
Data protection
data privacy
data anonymization
data anonimization
composability
central governments
Brazilian higher education evaluation system
ARX k-anonymization
ARX
biblio
Meeting the Demand: Building a Cybersecurity Degree Program With Limited Resources
Submitted by grigby1 on Wed, 11/04/2020 - 2:02pm
cybersecurity program accreditation criteria
universities
security of data
publicized cyber-attacks
pubcrawl
privacy
internet
Industries
further education
Educational institutions
educational courses
education
Computational modeling
cybersecurity education
cybersecurity degree program
cybersecurity curriculum
cybersecurity courses
cyber physical systems
computer security
Computer Science programs
computer science education
computer science
computer aided instruction
biblio
Gathering Insights from Teenagers’ Hacking Experience with Authentic Cybersecurity Tools
Submitted by grigby1 on Wed, 11/04/2020 - 2:01pm
Games
tools
serious games (computing)
science-popularizing program
realistic virtual network infrastructure
pubcrawl
program testing
professional game
privacy
Penetration Testing
Hacking
active learning
further education
education
cybersecurity tools
cybersecurity game
cybersecurity education
cyber physical systems
Conferences
Computer crime
computer aided instruction
authentic cybersecurity
biblio
An Example of a Cybersecurity Education Model
Submitted by grigby1 on Wed, 11/04/2020 - 1:44pm
experts
security of data
pubcrawl
privacy
information technology perspective
information technology
Information systems
higher education training
further education
competencies
education
cybersecurity education model
cybersecurity education
Cybersecurity
cyber physical systems
curriculum
computer aided instruction
biblio
Development of Training System and Practice Contents for Cybersecurity Education
Submitted by grigby1 on Wed, 11/04/2020 - 1:44pm
further education
virtual computer environment
training system development
security personnel
security of data
security fields
pubcrawl
privacy
practice contents
human resource development
higher education institutions
commercial training system
exercise system
Educational institutions
education
defense exercise program
CyExec
cybersecurity exercise system
cybersecurity education
Cybersecurity
cyber physical systems
computer science education
biblio
Assessing E-Security Behavior among Students in Higher Education
Submitted by aekwall on Mon, 10/12/2020 - 11:45am
behavior
Human Behavior and Cybersecurity
United Arab Emirates
Security Behavior Survey Instrument
password usage
online scam
higher educational institutions
higher education students
further education
e-security behavior assessment
E-security awareness
social engineering
Educational institutions
authorisation
data handling
Human Factors
Phishing
password
Cybersecurity
internet
Computer crime
pubcrawl
Human behavior
Electronic mail
invasive software
malware
biblio
Learning Agile with Intelligent Conversational Agents
Submitted by grigby1 on Thu, 07/16/2020 - 12:32pm
Planning
knowledge creation
Laboratories
learning analysis
learning analytics
Metrics
multi-agent systems
Multimedia systems
organizational environments
internet
pubcrawl
Scalability
Software
software engineering
software engineering industry
teaching
traditional teaching-learning instruments
Training
educational courses
academic SE curriculum
agile adoption
Agile Scrum training
assistive web-based conversational service
computer aided instruction
computer science education
conversational agent
conversational agents
academic fields
educational design
educational effectiveness
educative background
further education
higher education
Human behavior
intelligent conversational agents
biblio
eAssessment by Using a Trustworthy System in Blended and Online Institutions
Submitted by grigby1 on Fri, 02/08/2019 - 4:36pm
keystroke dynamics
voice recognition
Trustworthy Systems
trustworthy system
trustworthiness
trust-driven solutions
TeSLA system
Technology-enhanced learning
Task Analysis
Speech recognition
Resiliency
resilience
pubcrawl
Plagiarism
online learning
online evaluation
assessment tasks
internet
Instruments
innovative solution
further education
Fingerprint recognition
face recognition
Educational institutions
eAssessment
cyber physical systems
computer aided instruction
composability
challenging problems
blended-learning
blended university
authentication
1
2
next ›
last »