{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,26]],"date-time":"2024-02-26T14:12:30Z","timestamp":1708956750746},"reference-count":30,"publisher":"IGI Global","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4,1]]},"abstract":"<p>This study was designed to compare pre-service teachers\u2019 attitudes to those of general computer end-users on taking proactive measures to prevent cyber crime. Nineteen pre-service teachers, enrolled in a three-credit technology course in 2009, completed a survey instrument created by the researchers to analyze perceptions of Information Assurance (IA) and cyber security. The findings indicated a lack of best practices in IA that was no different from that of general computer end-users to protect personal electronic information.<\/p>","DOI":"10.4018\/jicte.2012040108","type":"journal-article","created":{"date-parts":[[2012,3,29]],"date-time":"2012-03-29T13:34:57Z","timestamp":1333028097000},"page":"94-101","source":"Crossref","is-referenced-by-count":10,"title":["Pre-Service Teachers\u2019 Perceptions of Information Assurance and Cyber Security"],"prefix":"10.4018","volume":"8","author":[{"given":"Joachim Jack","family":"Agamba","sequence":"first","affiliation":[{"name":"Idaho State University, USA"}]},{"given":"Jared","family":"Keengwe","sequence":"additional","affiliation":[{"name":"University of North Dakota, USA"}]}],"member":"2432","reference":[{"key":"jicte.2012040108-0","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"jicte.2012040108-1","unstructured":"Azadegan, S., O\u2019Leary, M., Wijesinha, A., & Zimand, M. (2006). Undergraduate computer security education: A report on our experiences & learning. In Proceedings of the Seventh Workshop on Education in Computer Security, Monterey, CA."},{"key":"jicte.2012040108-2","unstructured":"Bishop, M. (1993, May). Teaching computer security. In Proceedings of the Ninth IFIP International Symposium on Computer Security (pp. 43-52)."},{"key":"jicte.2012040108-3","doi-asserted-by":"crossref","unstructured":"Bratus, S., Shubina, A., & Locasto, E. L. (2010, March 10-13). Teaching the principles of the hacker curriculum to undergraduates. In Proceedings of the 41st ACM Technical Symposium on Computer Science Education, Milwaukee, WI.","DOI":"10.1145\/1734263.1734303"},{"key":"jicte.2012040108-4","unstructured":"Chandler, J. A. (2004). Security in cyberspace: Combating distribute denial of service attacks. University of Ottawa Law and Technology Journal, (2003\/2004), 231-261."},{"issue":"3","key":"jicte.2012040108-5","first-page":"7","article-title":"Education's critical role in cybersecurity.","volume":"32","author":"L.Clinton","year":"2009","journal-title":"EDUCAUSE Quarterly"},{"issue":"3","key":"jicte.2012040108-6","first-page":"4","article-title":"Academia's role in securing cyberspace.","volume":"32","author":"J.Cohon","year":"2009","journal-title":"EDUCAUSE Quarterly"},{"key":"jicte.2012040108-7","author":"J. W.Creswell","year":"2009","journal-title":"Research design: Qualitative, quantitative, and mixed methods approaches"},{"key":"jicte.2012040108-8","unstructured":"Dark, M., Epstein, R., Morales, L., Countermine, T., Yuan, Q., & Ali, M. (2006, June 5-8). A framework for information security ethics in education. In Proceedings of the 10th Colloquium for Information Systems Security Education, Baltimore, MD."},{"key":"jicte.2012040108-9","doi-asserted-by":"crossref","unstructured":"Depalma, P., Frank, C., Gladfelter, S., & Holden, J. (2004, March 3-7). Cryptography and computer security for undergraduates. In Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, Norfolk, VA.","DOI":"10.1145\/971300.971334"},{"key":"jicte.2012040108-10","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"jicte.2012040108-11","unstructured":"Driscoll, D. L., & Brizee, A. (2010). Creating good interview and survey questions. Retrieved August 19, 2011 fromhttp:\/\/owl.english.purdue.edu\/owl\/resource\/551\/01"},{"key":"jicte.2012040108-12","doi-asserted-by":"crossref","unstructured":"Egelman, S., King, J., Miller, R. C., Ragouzis, N., & Shehan, E. (2007, April 28-May 3). Security user studies: methodologies and best practices. In Proceedings of the Extended Abstracts on Human factors in Computing Systems, San Jose, CA (pp. 2833-2836).","DOI":"10.1145\/1240866.1241089"},{"issue":"1","key":"jicte.2012040108-13","first-page":"95","article-title":"Increasing preservice teachers' capacity for technology integration through use of electronic models.","volume":"30","author":"P. A.Ertmer","year":"2003","journal-title":"Teacher Education Quarterly"},{"key":"jicte.2012040108-14","unstructured":"Featherstone, B. (2009, April). Exploring hacker culture. The Epoch Times. Retrieved June 10, 2011, from http:\/\/www.theepochtimes.com\/n2\/content\/view\/14989\/"},{"issue":"9","key":"jicte.2012040108-15","first-page":"A47","article-title":"Colleges share ideas to teach digital security.","volume":"51","author":"A. L.Foster","year":"2004","journal-title":"The Chronicle of Higher Education"},{"key":"jicte.2012040108-16","unstructured":"Fruge, J. W. (2008). Comparing information assurance awareness training: A content analysis examination of the air force and defense information systems agency user training models. Retrieved August 7, 2011 from http:\/\/handle.dtic.mil\/100.2\/ADA482729"},{"key":"jicte.2012040108-17","author":"K.Hafner","year":"1995","journal-title":"Cyberpunk: Outlaws, hackers on the computer frontier"},{"key":"jicte.2012040108-18","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2729.2010.00389.x"},{"key":"jicte.2012040108-19","unstructured":"Hight, S. D. (2005). The importance of a security, education, training and awareness program. Retrieved August 16, 2011 from http:\/\/www.infosecwriters.com\/text_resources\/pdf\/SETA_SHight.pdf"},{"issue":"4","key":"jicte.2012040108-20","first-page":"37","article-title":"Computer ethics: A slow fade from black and white to shades of gray.","volume":"9","author":"T. A.Kraft","year":"2010","journal-title":"Information Systems Education Journal"},{"key":"jicte.2012040108-21","unstructured":"Maconachy, W. V., Schou, C. D., Ragsdale, D., & Welch, D. (2001, June 5-6). A model for information assurance: An integrated model. In Proceedings of the IEEE Workshop on Information Assurance and Security, West Point, NY (pp. 302-310)."},{"issue":"14","key":"jicte.2012040108-22","first-page":"8","article-title":"Who\u2019s responsible for cyber security?","volume":"21","author":"C. D.Marsan","year":"2004","journal-title":"New World (New Orleans, La.)"},{"issue":"18","key":"jicte.2012040108-23","first-page":"429","article-title":"We must educate young people about cybercrime before they start college.","volume":"53","author":"S. C.McQuade","year":"2007","journal-title":"The Chronicle of Higher Education"},{"key":"jicte.2012040108-24","unstructured":"O\u2019Leary, M. (2006, June 27). A laboratory based capstone course in computer security for undergraduates. A dedicated undergraduate track in computer security education. In Proceedings of the Third Annual World Conference on Information Security Education, Monterey, CA."},{"key":"jicte.2012040108-25","unstructured":"Schou, C. D., & Trimmer, K. J. (2004). Information assurance and security. Journal of Organizational and End User Computing on Information Security, 1-7."},{"key":"jicte.2012040108-26","doi-asserted-by":"publisher","DOI":"10.1108\/09685220210436976"},{"key":"jicte.2012040108-27","unstructured":"Stansbury, M. (2008). Feds: One-fourth of security breaches involve schools. eSchool News, 11(6), 12."},{"key":"jicte.2012040108-28","doi-asserted-by":"publisher","DOI":"10.1007\/s11092-011-9118-2"},{"issue":"1","key":"jicte.2012040108-29","first-page":"90","article-title":"Teaching ethics in undergraduate network security courses: The cautionary tale of Randal Schwartz.","volume":"19","author":"T.Wulf","year":"2003","journal-title":"Journal of Computing Sciences in Colleges"}],"container-title":["International Journal of Information and Communication Technology Education"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=65581","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T02:08:32Z","timestamp":1654135712000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jicte.2012040108"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2012,4,1]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2012,4]]}},"URL":"https:\/\/doi.org\/10.4018\/jicte.2012040108","relation":{},"ISSN":["1550-1876","1550-1337"],"issn-type":[{"value":"1550-1876","type":"print"},{"value":"1550-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,1]]}}}