As the use of innovative technologies continue to grow at rapid rate, so does the need to protect these technologies from hackers performing breaches to steal user’s data. To protect users, cyber-security awareness materials should be readily available to guide users understanding of the vulnerabilities existing in their technological devices; explore the plethora of tactics carried out by hackers to steal their data, and identify measures they can take to ensure their safety as they utilize their devices. The objective of this work is to develop cyber-security awareness materials in Google Classroom using instructional technology design principles to accommodate user learning styles while increasing cyber-security expertise. We create two ...
Good security is not intrusive and can be almost invisible to typical users, who are often unaware o...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
Cybersecurity is a field of Computer Science that focuses on protecting networks, devices, and data ...
Cyber security has come under the spotlight in recent years as cyber-attacks and threats continue to...
Good security is not intrusive and can be almost invisible to typical users, who are often unaware o...
We are witnessing the rapid development and adoption of Cyber-Physical Systems (CPS). CPS refers to ...
Cyber Security is a combination of processes, technologies and practices. The objective of Cyber Sec...
Information security attacks targeting human nature, such as phishing, are rising rapidly. Informati...
With the introduction of the Information and Communication Technologies (ICT) into our lives, produc...
In the news today, we often hear about nationally encompassing data breaches, with credit card infor...
As our dependency on technology continues to increase, so does the need for computer security. Colle...
© The Author(s) 2020. Cybersecurity comprised all the technologies and practices that protect data a...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...
Cybersecurity is one of the greatest challenges society faces in an age revolving around technologic...
Good security is not intrusive and can be almost invisible to typical users, who are often unaware o...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
Cybersecurity is a field of Computer Science that focuses on protecting networks, devices, and data ...
Cyber security has come under the spotlight in recent years as cyber-attacks and threats continue to...
Good security is not intrusive and can be almost invisible to typical users, who are often unaware o...
We are witnessing the rapid development and adoption of Cyber-Physical Systems (CPS). CPS refers to ...
Cyber Security is a combination of processes, technologies and practices. The objective of Cyber Sec...
Information security attacks targeting human nature, such as phishing, are rising rapidly. Informati...
With the introduction of the Information and Communication Technologies (ICT) into our lives, produc...
In the news today, we often hear about nationally encompassing data breaches, with credit card infor...
As our dependency on technology continues to increase, so does the need for computer security. Colle...
© The Author(s) 2020. Cybersecurity comprised all the technologies and practices that protect data a...
In order to combat malicious actors of the digital age, cybersecurity experts have quickly become es...
Cybersecurity is one of the greatest challenges society faces in an age revolving around technologic...
Good security is not intrusive and can be almost invisible to typical users, who are often unaware o...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...
Cyber-enabled devices are becoming more and more complex with integration of new capabilities and fu...