This document provides a project plan for a cybersecurity awareness campaign targeting RMIT students. It outlines the purpose, aim, context, audience, message and objectives of the campaign. The campaign aims to raise awareness of cybersecurity risks and encourage responsible online behavior through interactive and engaging messaging. Research found students are aware of risks but do not fully understand potential consequences of common online habits. The plan details stakeholders involved and challenges of the dispersed student body and limited budget. The campaign will utilize ambient ads, videos and posters across RMIT campuses from weeks 2 to 12 of semester 1, 2019 to confront students with cybersecurity risks in a memorable way.
This document discusses the development of an online program called "Staying Safe In Cyber Space" (SSICS) aimed at educating children aged 12-14 on cyber security risks like malware and phishing. The program was tested in Scottish high schools through classroom sessions and questionnaires to evaluate its effectiveness. Results showed an overall enhancement in students' understanding of cyber threats and that they enjoyed using the program. For SSICS to have a wider impact and integrate with the Scottish curriculum, it would need broader implementation across more classrooms in Scotland.
Campus Consortium EdTalks: The Future of IT in Education Featuring College of...Campus Consortium
Mark Staples, Chief Information Officer at the College of Charleston, discussed how information technology will evolve to meet the needs of higher education in 2020. He noted that by 2020, higher education will be quite different from today, with more online and hybrid learning approaches. Significant barriers to change include the digital divide, lack of digital literacy skills, and need for new teaching approaches. Information technology leadership will need to shift from a focus on technology to digital strategies, and provide data analytics to support enrollment, retention, and student services.
Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...Madison Ramsay
What you'll learn:
1. How to use 2-way campus communication at three levels for targeted messaging:
Global
Topic specific channels
Private direct messaging
2. Best practices to maintain remote student engagement
Content publication & syndication (eg: Emergency Response Toolkit)
Push notifications
Virtual communities
Please join us as we review relevant solutions to help you maintain the integrity of your institutional programs while keeping your campus informed throughout the COVID-19 crisis.
The document provides information about an International Bachelor's degree program in Data Science by Design. The 3-year program trains students in both data science and design skills. In the first two years, students take courses in mathematics, computer science, statistics, and programming. They also complete projects and a semester abroad. In the third year, students specialize in data science, machine learning, and design thinking methodology. The unique aspect of the program is its combination of data science and design skills to solve problems and create positive life experiences.
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET Journal
This document summarizes a research project that aims to measure parental awareness of cyber security risks to children. The project involved surveying parents of children aged 17 and below. 384 parents were surveyed using an online questionnaire. The questionnaire gathered information on parental awareness of their children's online activities, cyber security education programs, and perceived cyber threats. Responses were analyzed using statistical software to understand levels of parental awareness. Key findings could help establish best practices for parental cyber security education and awareness programs.
This document provides guidelines for creating awareness materials about online safety for children, parents, educators, and the general public. It acknowledges the growing concerns around child online safety and the need to inform stakeholders about potential risks and how to reduce them. The document outlines principles, checklists, and standard content that awareness materials should contain, including opportunities and threats of the internet, how to be safe online, how to report issues and seek help, and audience-specific information for children, parents, teachers, and others. It emphasizes the need for effective reporting mechanisms and support services to help translate increased awareness into improved online safety for children.
This document discusses the development of an online program called "Staying Safe In Cyber Space" (SSICS) aimed at educating children aged 12-14 on cyber security risks like malware and phishing. The program was tested in Scottish high schools through classroom sessions and questionnaires to evaluate its effectiveness. Results showed an overall enhancement in students' understanding of cyber threats and that they enjoyed using the program. For SSICS to have a wider impact and integrate with the Scottish curriculum, it would need broader implementation across more classrooms in Scotland.
Campus Consortium EdTalks: The Future of IT in Education Featuring College of...Campus Consortium
Mark Staples, Chief Information Officer at the College of Charleston, discussed how information technology will evolve to meet the needs of higher education in 2020. He noted that by 2020, higher education will be quite different from today, with more online and hybrid learning approaches. Significant barriers to change include the digital divide, lack of digital literacy skills, and need for new teaching approaches. Information technology leadership will need to shift from a focus on technology to digital strategies, and provide data analytics to support enrollment, retention, and student services.
Emergency Preparedness: Leveraging Mobile Messaging & Virtual Communities to ...Madison Ramsay
What you'll learn:
1. How to use 2-way campus communication at three levels for targeted messaging:
Global
Topic specific channels
Private direct messaging
2. Best practices to maintain remote student engagement
Content publication & syndication (eg: Emergency Response Toolkit)
Push notifications
Virtual communities
Please join us as we review relevant solutions to help you maintain the integrity of your institutional programs while keeping your campus informed throughout the COVID-19 crisis.
The document provides information about an International Bachelor's degree program in Data Science by Design. The 3-year program trains students in both data science and design skills. In the first two years, students take courses in mathematics, computer science, statistics, and programming. They also complete projects and a semester abroad. In the third year, students specialize in data science, machine learning, and design thinking methodology. The unique aspect of the program is its combination of data science and design skills to solve problems and create positive life experiences.
IRJET- Review on Cyber Security Situational Awareness among ParentsIRJET Journal
This document summarizes a research project that aims to measure parental awareness of cyber security risks to children. The project involved surveying parents of children aged 17 and below. 384 parents were surveyed using an online questionnaire. The questionnaire gathered information on parental awareness of their children's online activities, cyber security education programs, and perceived cyber threats. Responses were analyzed using statistical software to understand levels of parental awareness. Key findings could help establish best practices for parental cyber security education and awareness programs.
This document provides guidelines for creating awareness materials about online safety for children, parents, educators, and the general public. It acknowledges the growing concerns around child online safety and the need to inform stakeholders about potential risks and how to reduce them. The document outlines principles, checklists, and standard content that awareness materials should contain, including opportunities and threats of the internet, how to be safe online, how to report issues and seek help, and audience-specific information for children, parents, teachers, and others. It emphasizes the need for effective reporting mechanisms and support services to help translate increased awareness into improved online safety for children.
Robert Monegro is applying for an IT leadership position at Hostos Community College. He has over 24 years of experience in higher education IT management, including expertise in project management, customer support, infrastructure design, and instructional technology. Currently, he is the Senior Manager of Classroom Technology and Conference Services at St. John's University, where he oversees classroom technology operations and manages classroom upgrade projects.
Education systems and its actors are generally responding to quarantine and large-scale shutdown (partial) of cities with a sudden shift to Web-Based Learning. However, given that a pandemic of this nature and scale is novel, there is a knowledge gap as to how teachers and learners should respond to the shift, and what the likely impact and the key considerations should be. This study aims to extrapolate and theorize from the existing knowledgebase about the use of Web-Based Learning, as well as from an expert and practitioner wisdom and experience, to offer high-level guidance for policymakers and education system actors that are forced to make decisions in fast-moving and very challenging circumstances with little guidance or relevant experience. It is an early attempt at theorizing the impact of the pandemic on two key actors (Learners and Teachers) and one interface (Content), all across eight dimensions of learning. The analysis is based on Khan’s (2001) dimension of Web-Based Learning and Anderson’s (2011) Model of Online Learning. Overall, we posit based on experience and practice, that the pandemic has delivered severe shocks to both the demand and supply side of Web-Based Learning, with Leaners, Teachers, and Content all significantly affected. While we hypothesize a general drop in the quality of teaching and learning in the short run, we expect the opposite to be the case in the long run, when the demand and supply side self-correct, albeit guided by strong government and market institutions.
Students are experienced internet users but less experienced in their careers. A survey of 130 tertiary students found they are most confident using technology to find information but least confident using it to build professional relationships. While most students use LinkedIn, they have low confidence in using it, especially to build connections. Career practitioners see building students' digital career literacy as important but face challenges like inconsistent department messaging and limited online resources.
Why Read This Green Paper
The demand by your students, parents, business leaders and community to ensure that digital communications are safe, effortless and effective is complicated by the ever changing and accelerating speed of social media. As social media continues to evolve, how can your district keep pace?
In this green paper, get more insight into how school administrators and career and technical education leaders can embrace social media to improve student safety, employability, soft skills and college and career readiness. From an operations standpoint, this paper also outlines a proven method to decrease the amount of time required for and the accuracy of annual state CTE reporting.
Key questions addressed include:
• What is the role of social media in education?
• How can social media be employed to meet the needs of your intended audiences -students, parents, teachers, business leaders and community?
• How can schools effectively engage and employ social media to achieve results?
• How can CTE administrators and educators more effectively report state results?
The document discusses the impact of information and communication technology (ICT) on learning, individuals, organizations, and society. It outlines both positive and negative effects. Positively, ICT improves access to information and education, but it can also result in job loss and reduced personal interaction. For organizations, ICT increases costs and security issues. While ICT enhances communication and participation in society, it can also worsen the digital divide and spread of misinformation.
The document summarizes a survey conducted on cybersecurity habits of RMIT university students in Melbourne. The key findings are:
1) Most students are aware of cybersecurity but tend to ignore risks and give out personal information like email and birthdate. Many use the same passwords across accounts.
2) The target audience for a cybersecurity awareness campaign is RMIT students in Melbourne aged 18-30 across all genders. Students understand risks but trust that nothing bad will happen and may give out info for deals.
3) The campaign timeline is semester 1 of 2019, running escalator ads, webcam covers, social media posts and digital posters/videos from weeks 2-12. The proposed budget is $33
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
This document reports on a survey and educational seminar about social media usage and cybercrime awareness among youth in government colleges in India. The survey found that most students use social media frequently but have little knowledge about cyber threats. It also found that students spend most evenings on social media and it negatively impacts their studies. However, most wanted to learn about cybercrime. To address this, researchers conducted an educational seminar on cybercrime trends, detection and legal issues. The seminar aimed to provide necessary information on cyber safety to students since many have smartphones and internet access but lack awareness of associated risks.
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...ijtsrd
The inevitability of digital tools and technology usage has accelerated over the past 30 years and continues to grow rapidly. Digital interaction has become a part of everyday life and continues to covers our mind. This research assessed the likelihood of the respondents on how to deal technology properly. Using statistical tool and Survey Questionnaire, the data were analyzed using mean, percentages and t test two independent samples to measure the significant mean difference of the group respondents. The finding reveals that the group respondents were likely vulnerable when using digital tools. This includes the safety and security and their responsibilities. This study suggests that students and teachers were at risk during this advent of technology. Roberto L. Suson ""Digital Citizenship in Education: Visioning Safety and Responsibilities in Digital World"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25123.pdf
Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/education/25123/digital-citizenship-in-education-visioning-safety-and-responsibilities-in-digital-world/roberto-l-suson
UOW Faculty Of Arts Student Engagement & Communication Review (Spring 2...Dane Cutler
Seven Marketeers was established to execute part of the course deliverables of an undergraduate class in Digital Communications at the University of Wollongong in Spring 2010.
Seven Marketeers’ mission was to engage in detailed research to provide relevant, insightful and useful recommendations to two real world clients. The goal was to undertake an analysis of current and future online behavioural trends and provide actionable insights into how these trends can best be utilised to inform improved online user interface design and communications, with user satisfaction as the key objective. Seven Marketeers aimed to deliver a set of fully grounded and researched recommendations to its clients, so as to enable them to effectively meet the needs of a user-base that is continually modifying its expectations of information consumption as technology evolves.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
The document discusses the need for cybersecurity awareness programs in K-12 schools. It emphasizes that such programs should empower students with age-appropriate cyber knowledge, engage parents in cybersecurity discussions, and promote a culture of continuous learning. The document provides strategies for delivering cybersecurity education to students, examples of interactive activities, and tips for collaborating with parents and measuring program effectiveness. The overall goal is to safeguard the school community from online threats through a united effort between educators, parents and students.
IRJET- Prospects of Online Advertising and its Implications on ChildrenIRJET Journal
This document discusses the prospects of online advertising and its implications for children. It notes that while online advertising can have both positive and negative effects on children, children under 13 are particularly vulnerable to the negative effects due to their cognitive development stage. The document outlines how online advertising exposure has increased significantly as internet usage has risen globally. It examines factors that influence how children respond to advertising and the need for parents to help children critically analyze advertising messages. The document also proposes some measures to help protect children from undesirable impacts of online advertising, such as restricting device access and location.
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...BIJFMCF Journal
The overall aim of this study was to describe and understand how the impact of digitalization impacts students’ behavior on a high-level institution such as the University of Namibia. In order to achieve this aim, the following research questions/and research objectives were formulated. The findings of the study were as follows: About 60% of respondents indicated had benefited from digitalization offered by the University of Namibia. Meaning that students had a positive behavior on the digitalization in their learning environment.
The overall aim of this study was to describe and understand how the impact of digitalization impacts students’ behavior on a high-level institution such as the University of Namibia. In order to achieve this aim, the following research questions/and research objectives were formulated. The findings of the study were as follows: About 60% of respondents indicated had benefited from digitalization offered by the University of Namibia. Meaning that students had a positive behavior on the digitalization in their learning environment. But about 5 (25%) and 4 (20%) of the respondents showed their disagreement. 4 (20%) of the respondents were neutral as the opted in the
middle of the data collection. Only 2 (10%) of the respondents were in agreement with the digital online platforms that it created a more collaborative lecture room environment at the University of Namibia. With thus, students were unsatisfied with digital online platforms in the lecture room and referred to it of being very inadequate and unreliable. With that mind it is recommended that the digitalization should be updated, restructure and improved by the University for Better Performances and the promotion of learning among the
stakeholders.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...Keiko Tanaka
Speakers' slide deck for Privacy By Design Conference 2023, session on Protecting Privacy of Children Through Data Governance.
Privacy by Design Conference 2023とは
プライバシーに関わる、文化、法律、テクノロジー、ビジネス、オペレーションなどのさまざまな立場の方が、多様な視点で対話を行うためのカンファレンスです。
15:20 ~ 16:20 「子供のプライバシー対策に必要なもの」
MyData Global Board Member 2020 & 2021 Dixon Siu
京都情報大学院大学 助教 田中恵子
EDDS創始者、ロンドン・スクール・オブ・エコノミクス客員研究員 ヴェリスラーバ・ヒルマン 氏
一般社団法人Privacy by Design Lab 代表理事 栗原宏平
What is the purpose of a digital citizenship program? Who is the audience in schools - teachers, parents, students? This presentation looks at some of the research and discusses the factors to consider when developing a digital citizenship program for your school.
NMC Strategic Brief - Digital Literacy in Higher EducationCourtney Miller
Digital Literacy in Higher Education, Part II: An NMC Horizon Project Strategic Brief explores the landscape
of digital literacy as it relates to advancing more authentic learning in campus settings. Supported by
Adobe, the aim of this independent research is to illuminate current frameworks, exemplars, and
challenges that are impacting the evolution of this pressing topic. The brief is intended to contribute
to the body of knowledge used by the higher education community to inform strategic planning
around digital literacy initiatives.
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...FinancialMarketCorpo
The overall aim of this study was to describe and understand how the impact of digitalization impacts
students’ behavior on a high-level institution such as the University of Namibia. In order to achieve this aim, the
following research questions/and research objectives were formulated. The findings of the study were as follows:
About 60% of respondents indicated had benefited from digitalization offered by the University of Namibia. Meaning that students had a positive behavior on the digitalization in their learning environment. But about 5 (25%) and
4 (20%) of the respondents showed their disagreement. 4 (20%) of the respondents were neutral as the opted in the
middle of the data collection. Only 2 (10%) of the respondents were in agreement with the digital online platforms
that it created a more collaborative lecture room environment at the University of Namibia.
With thus, students were unsatisfied with digital online platforms in the lecture room and referred to it of being
very inadequate and unreliable. With that mind it is recommended that the digitalization should be updated,
restructure and improved by the University for Better Performances and the promotion of learning among the
stakeholders.
This document discusses a report on attitudes towards IT in UK universities from the perspectives of students, IT decision makers, and university leaders. Some key findings from surveys of these groups include:
- Students see IT as very important and it influences their choice of university. They expect to access systems remotely like at home.
- IT departments recognize the importance of meeting student IT needs but over a third admit they are not currently meeting student needs.
- Only 13% of universities offer campus-wide WiFi, limiting students' flexibility in accessing systems from any location on campus.
Robert Monegro is applying for an IT leadership position at Hostos Community College. He has over 24 years of experience in higher education IT management, including expertise in project management, customer support, infrastructure design, and instructional technology. Currently, he is the Senior Manager of Classroom Technology and Conference Services at St. John's University, where he oversees classroom technology operations and manages classroom upgrade projects.
Education systems and its actors are generally responding to quarantine and large-scale shutdown (partial) of cities with a sudden shift to Web-Based Learning. However, given that a pandemic of this nature and scale is novel, there is a knowledge gap as to how teachers and learners should respond to the shift, and what the likely impact and the key considerations should be. This study aims to extrapolate and theorize from the existing knowledgebase about the use of Web-Based Learning, as well as from an expert and practitioner wisdom and experience, to offer high-level guidance for policymakers and education system actors that are forced to make decisions in fast-moving and very challenging circumstances with little guidance or relevant experience. It is an early attempt at theorizing the impact of the pandemic on two key actors (Learners and Teachers) and one interface (Content), all across eight dimensions of learning. The analysis is based on Khan’s (2001) dimension of Web-Based Learning and Anderson’s (2011) Model of Online Learning. Overall, we posit based on experience and practice, that the pandemic has delivered severe shocks to both the demand and supply side of Web-Based Learning, with Leaners, Teachers, and Content all significantly affected. While we hypothesize a general drop in the quality of teaching and learning in the short run, we expect the opposite to be the case in the long run, when the demand and supply side self-correct, albeit guided by strong government and market institutions.
Students are experienced internet users but less experienced in their careers. A survey of 130 tertiary students found they are most confident using technology to find information but least confident using it to build professional relationships. While most students use LinkedIn, they have low confidence in using it, especially to build connections. Career practitioners see building students' digital career literacy as important but face challenges like inconsistent department messaging and limited online resources.
Why Read This Green Paper
The demand by your students, parents, business leaders and community to ensure that digital communications are safe, effortless and effective is complicated by the ever changing and accelerating speed of social media. As social media continues to evolve, how can your district keep pace?
In this green paper, get more insight into how school administrators and career and technical education leaders can embrace social media to improve student safety, employability, soft skills and college and career readiness. From an operations standpoint, this paper also outlines a proven method to decrease the amount of time required for and the accuracy of annual state CTE reporting.
Key questions addressed include:
• What is the role of social media in education?
• How can social media be employed to meet the needs of your intended audiences -students, parents, teachers, business leaders and community?
• How can schools effectively engage and employ social media to achieve results?
• How can CTE administrators and educators more effectively report state results?
The document discusses the impact of information and communication technology (ICT) on learning, individuals, organizations, and society. It outlines both positive and negative effects. Positively, ICT improves access to information and education, but it can also result in job loss and reduced personal interaction. For organizations, ICT increases costs and security issues. While ICT enhances communication and participation in society, it can also worsen the digital divide and spread of misinformation.
The document summarizes a survey conducted on cybersecurity habits of RMIT university students in Melbourne. The key findings are:
1) Most students are aware of cybersecurity but tend to ignore risks and give out personal information like email and birthdate. Many use the same passwords across accounts.
2) The target audience for a cybersecurity awareness campaign is RMIT students in Melbourne aged 18-30 across all genders. Students understand risks but trust that nothing bad will happen and may give out info for deals.
3) The campaign timeline is semester 1 of 2019, running escalator ads, webcam covers, social media posts and digital posters/videos from weeks 2-12. The proposed budget is $33
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
This document reports on a survey and educational seminar about social media usage and cybercrime awareness among youth in government colleges in India. The survey found that most students use social media frequently but have little knowledge about cyber threats. It also found that students spend most evenings on social media and it negatively impacts their studies. However, most wanted to learn about cybercrime. To address this, researchers conducted an educational seminar on cybercrime trends, detection and legal issues. The seminar aimed to provide necessary information on cyber safety to students since many have smartphones and internet access but lack awareness of associated risks.
Digital Citizenship in Education Visioning Safety and Responsibilities in Dig...ijtsrd
The inevitability of digital tools and technology usage has accelerated over the past 30 years and continues to grow rapidly. Digital interaction has become a part of everyday life and continues to covers our mind. This research assessed the likelihood of the respondents on how to deal technology properly. Using statistical tool and Survey Questionnaire, the data were analyzed using mean, percentages and t test two independent samples to measure the significant mean difference of the group respondents. The finding reveals that the group respondents were likely vulnerable when using digital tools. This includes the safety and security and their responsibilities. This study suggests that students and teachers were at risk during this advent of technology. Roberto L. Suson ""Digital Citizenship in Education: Visioning Safety and Responsibilities in Digital World"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25123.pdf
Paper URL: https://www.ijtsrd.com/humanities-and-the-arts/education/25123/digital-citizenship-in-education-visioning-safety-and-responsibilities-in-digital-world/roberto-l-suson
UOW Faculty Of Arts Student Engagement & Communication Review (Spring 2...Dane Cutler
Seven Marketeers was established to execute part of the course deliverables of an undergraduate class in Digital Communications at the University of Wollongong in Spring 2010.
Seven Marketeers’ mission was to engage in detailed research to provide relevant, insightful and useful recommendations to two real world clients. The goal was to undertake an analysis of current and future online behavioural trends and provide actionable insights into how these trends can best be utilised to inform improved online user interface design and communications, with user satisfaction as the key objective. Seven Marketeers aimed to deliver a set of fully grounded and researched recommendations to its clients, so as to enable them to effectively meet the needs of a user-base that is continually modifying its expectations of information consumption as technology evolves.
Safeguarding K-12 Organizations from Cybersecurity Threats WPGC.pdfmeetsolanki44
The document discusses the need for cybersecurity awareness programs in K-12 schools. It emphasizes that such programs should empower students with age-appropriate cyber knowledge, engage parents in cybersecurity discussions, and promote a culture of continuous learning. The document provides strategies for delivering cybersecurity education to students, examples of interactive activities, and tips for collaborating with parents and measuring program effectiveness. The overall goal is to safeguard the school community from online threats through a united effort between educators, parents and students.
IRJET- Prospects of Online Advertising and its Implications on ChildrenIRJET Journal
This document discusses the prospects of online advertising and its implications for children. It notes that while online advertising can have both positive and negative effects on children, children under 13 are particularly vulnerable to the negative effects due to their cognitive development stage. The document outlines how online advertising exposure has increased significantly as internet usage has risen globally. It examines factors that influence how children respond to advertising and the need for parents to help children critically analyze advertising messages. The document also proposes some measures to help protect children from undesirable impacts of online advertising, such as restricting device access and location.
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...BIJFMCF Journal
The overall aim of this study was to describe and understand how the impact of digitalization impacts students’ behavior on a high-level institution such as the University of Namibia. In order to achieve this aim, the following research questions/and research objectives were formulated. The findings of the study were as follows: About 60% of respondents indicated had benefited from digitalization offered by the University of Namibia. Meaning that students had a positive behavior on the digitalization in their learning environment.
The overall aim of this study was to describe and understand how the impact of digitalization impacts students’ behavior on a high-level institution such as the University of Namibia. In order to achieve this aim, the following research questions/and research objectives were formulated. The findings of the study were as follows: About 60% of respondents indicated had benefited from digitalization offered by the University of Namibia. Meaning that students had a positive behavior on the digitalization in their learning environment. But about 5 (25%) and 4 (20%) of the respondents showed their disagreement. 4 (20%) of the respondents were neutral as the opted in the
middle of the data collection. Only 2 (10%) of the respondents were in agreement with the digital online platforms that it created a more collaborative lecture room environment at the University of Namibia. With thus, students were unsatisfied with digital online platforms in the lecture room and referred to it of being very inadequate and unreliable. With that mind it is recommended that the digitalization should be updated, restructure and improved by the University for Better Performances and the promotion of learning among the
stakeholders.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
B9_21_子供のプライバシー対策に必要なもの Speakers' slide deck for Privacy By Design Conference...Keiko Tanaka
Speakers' slide deck for Privacy By Design Conference 2023, session on Protecting Privacy of Children Through Data Governance.
Privacy by Design Conference 2023とは
プライバシーに関わる、文化、法律、テクノロジー、ビジネス、オペレーションなどのさまざまな立場の方が、多様な視点で対話を行うためのカンファレンスです。
15:20 ~ 16:20 「子供のプライバシー対策に必要なもの」
MyData Global Board Member 2020 & 2021 Dixon Siu
京都情報大学院大学 助教 田中恵子
EDDS創始者、ロンドン・スクール・オブ・エコノミクス客員研究員 ヴェリスラーバ・ヒルマン 氏
一般社団法人Privacy by Design Lab 代表理事 栗原宏平
What is the purpose of a digital citizenship program? Who is the audience in schools - teachers, parents, students? This presentation looks at some of the research and discusses the factors to consider when developing a digital citizenship program for your school.
NMC Strategic Brief - Digital Literacy in Higher EducationCourtney Miller
Digital Literacy in Higher Education, Part II: An NMC Horizon Project Strategic Brief explores the landscape
of digital literacy as it relates to advancing more authentic learning in campus settings. Supported by
Adobe, the aim of this independent research is to illuminate current frameworks, exemplars, and
challenges that are impacting the evolution of this pressing topic. The brief is intended to contribute
to the body of knowledge used by the higher education community to inform strategic planning
around digital literacy initiatives.
The Impact Digitalization Has on Students’ Behavior on a High-Level Instituti...FinancialMarketCorpo
The overall aim of this study was to describe and understand how the impact of digitalization impacts
students’ behavior on a high-level institution such as the University of Namibia. In order to achieve this aim, the
following research questions/and research objectives were formulated. The findings of the study were as follows:
About 60% of respondents indicated had benefited from digitalization offered by the University of Namibia. Meaning that students had a positive behavior on the digitalization in their learning environment. But about 5 (25%) and
4 (20%) of the respondents showed their disagreement. 4 (20%) of the respondents were neutral as the opted in the
middle of the data collection. Only 2 (10%) of the respondents were in agreement with the digital online platforms
that it created a more collaborative lecture room environment at the University of Namibia.
With thus, students were unsatisfied with digital online platforms in the lecture room and referred to it of being
very inadequate and unreliable. With that mind it is recommended that the digitalization should be updated,
restructure and improved by the University for Better Performances and the promotion of learning among the
stakeholders.
This document discusses a report on attitudes towards IT in UK universities from the perspectives of students, IT decision makers, and university leaders. Some key findings from surveys of these groups include:
- Students see IT as very important and it influences their choice of university. They expect to access systems remotely like at home.
- IT departments recognize the importance of meeting student IT needs but over a third admit they are not currently meeting student needs.
- Only 13% of universities offer campus-wide WiFi, limiting students' flexibility in accessing systems from any location on campus.
Learning Experience Design (ATD 2016 ICE W316)Chan Lee
The document discusses learning experience design and learner behaviors based on a presentation by Jay Chon and Chan Lee. Some key points:
- Learners expect immersive, on-demand learning experiences like popular apps, but learning experiences are often lacking.
- Mobile apps see much higher engagement than mobile web. Learning needs a mobile presence.
- Popular apps are social, entertainment, or utility focused. Learning does not feature highly.
- Data from 400+ companies shows mobile learners spend more time and are more engaged than web learners.
- Experience design should understand learner personas, map the learning journey, and define metrics for improvement.
Digital Literacy is an important instrument to strengthen customer strength to avoid risky credit behaviour. Apart from Digital Literacy, Financial Self Efficacy is also an important instrument to avoid this. Therefore, this research aims to analyze the influence of digital literacy and financial self-efficacy on risky credit behaviour. This research is quantitative research with an explanatory approach, namely research that uses previous research as a stepping stone for finding new findings. The data used in this research uses primary data collected using the 1-5 questionnaire method which contains agree, strongly agree, disagree and strongly disagree. The data used was analyzed via PLS 3.0. The research results show that the Digital Literacy and Financial Self Efficacy variables each have a positive relationship and a significant influence on Risky Credit Behavior. As Digital Literacy improves and Confidence in managing finances increases, it will further strengthen the potential of employees to avoid Risky Credit Behavior
Mobile Marketing and Social Media MBA specialization at NUNational University
This document summarizes a workshop on mobile marketing and social media for international students at National University (NU). It discusses why specialized skills in these areas are needed for current business. The agenda covers topics like disruptive trends, ad blocking, mobile friendliness and examples of mobile marketing campaigns. It also provides insights from industry professionals and outlines NU's graduate program and courses and career opportunities for mobile and social media marketers.
The Academic Performance and the Computer Programming Anxiety of BSIT Student...IJAEMSJORNAL
The 21st century has caused numerous significant impacts and advancements in the lives of people. Information Technology (IT) has contributed essential benefits in the different areas of the society. One of the vital skills in developing IT solutions is programming. For many, writing computer programs may be a very challenging task which may result in some levels of anxiety. This study aimed to describe and look at the relationship between the academic performance and the programming anxiety among Bachelor of Science in Information Technology (BSIT) students to provide a basis for instructional strategy improvement in the undergraduate level.
Similar to Icp assignment 2 a_group 11_project plan (20)
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
How to Make a Field Mandatory in Odoo 17Celine George
In Odoo, making a field required can be done through both Python code and XML views. When you set the required attribute to True in Python code, it makes the field required across all views where it's used. Conversely, when you set the required attribute in XML views, it makes the field required only in the context of that particular view.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Icp assignment 2 a_group 11_project plan
1. COMM2324 Assessment 2 Part A | Project Plan | Page 1
COMM2324 Interdisciplinary CommunicationProject
Project Plan
Team Name:MV
Project:Cybersecurity
Tutorial: Wednesday, 2:30 pm
Contents
1. Purpose 2
2. Aim 2
3. Context 2
4. Audience 4
5. Message 4
6. Objectives 4
7. Stakeholders 5
8. Challenges & Constraints 5
9. Point of Difference 7
10. Project Form 7
Appendix A: Production Plan 10
Appendix B: Project Ideation 10
11. References:
14
2. COMM2324 Assessment 2 Part A | Project Plan | Page 2
1. Purpose:
The purpose of our marketing schemes is to raise a greater awareness on the dangers of
cyber breaches around campus and inform students of their individual responsibility and
input in maintaining the cyber safety of the university. We are doing this because
knowledge on cybersecurity is an important factor in keeping the personal information of
both the university and students safe from hackers.
2. Aim:
Our aim is to raise enough awareness and help students understand the dangers of cyber
breaches and their vulnerability to it. We want students to be accountable in being cyber
aware at RMIT and outside of university and be responsible in keeping the university safe
from cyber breaches. We want them to respond to cyber threats, such as scams,
immediately and report any suspicious activity to the university. Therefore, we want to find
more interactive and interesting ways to reach out to students in order for them to take
cybersecurity seriously.
3. Context:
University networks are the source of important intellectual property data as well as
student personal information and sensitive business or political documents. Hence,
cybersecurity practice plays a central role in daily university management. Recently, it is in
the spotlight after Australian National University was reported to be the target of a serious
cyber attack. According to McMurdie C “Universities are a top target for cybercriminals” and
yet this issue has not been solved thoroughly. Overall, cybersecurity breaches have almost
doubled in the last five years – and the financial impact of these breaches is expected to
exceed A$10.1 trillion over the next five years (WEF Global Risk Report 2018). Since
cybersecurity is a socio-technical problem, it calls for all participants not only the technology
department (Astin G 2018). According to the data from RMIT’s Office of the Chief
Information Security Officer (CISO), even though RMIT has not yet been impacted by a
major cyber attack, the university is exposed to great cyber-threats on a daily basis due to
very big number of users accessing the RMIT network and about 500 000 emails are
managed via the servers everyday.
We conducted a survey to examine the level of cyber-awareness within city campus as well
as their reaction to the previous campaign of CISO. This survey reveals many noticeable
understandings of student cyber habits and their attitude towards this subject. Most of the
students heard about this term and all of them aware of its importance. They also think that
they are vulnerable to hacking in the future. However, 94,1% of responses showed that
students tend to give personal information when asked on the internet such as their email
accounts or birthday though all of them never pay attention to spam emails. The number of
students having tendency to give their details to a stranger is dominant over the rest. From
the survey, their habit of setting their password is also addressed. There is a big number of
students using the same password and their personal information for every account even
though most of them try to make their password complex. We also combine the survey
3. COMM2324 Assessment 2 Part A | Project Plan | Page 3
result from CISO which indicates that students primary use non-RMIT issued devices to
access RMIT networks which are harder to regulate using technology. This survey result also
shows that about half of university software online downloaded by students is from non-
trusted stores. Besides, only two in three students have security software on their mobile
phones and laptops. However, 22% of them avoid updating their mobile device regularly.
The research from CISO also pointed out in 2017, around 41% of students did not have their
devices scanned before opening documents, due to perceived time constraints or deeming
this step unnecessary. Noticeably, a third of students store passwords on their computer or
write them down, with around the same number admitting to using the same password for
work and personal accounts. The survey also indicated a negative result for student reaction
to previous campaigns of CISO. To conclude from both surveys, RMIT students are well
informed of this issue but the level of security awareness within the student body is still low.
They do not fully understand the potential risks behind their common internet practices and
tend to ignore the cybersecurity messages since they think it is boring and too common.
For this phase of the campaign, the first challenge to be faced is the wide area of RMIT city
campus. In addition to that, the campus is fragmented in terms of location and the
community is not closed so it is hard to capture students’ attention at once. Moreover, this
disperse and diverse audience spends less time on campus than previous student
generations, and are bombarded with internal and external messages every day so that they
tend to ignore any traditional ads on their way. As such, it intrigues us to create a campaign
that is original and get to the target audience’s top of mind in the most natural, fastest and
unexpected way. The second obstacle that we encountered is the limited budget from our
client. Taking an awareness campaign to the next level on a zero budget requires us to
exploit every useable channel and simplify the project idea to maximize the capacity we
have.
In addition to its expansive digital footprint, RMIT University is embarking on a digital
transformation journey to improve the experience, effectiveness, and quality of its teaching
and learning for students and staff. Cybersecurity is crucial to the enablement of this event
and the secure transformation will become increasingly more important as the university
increases its digital presence and student base. From the finding, most of RMIT’s cyber
breaches come from inadvertent data breaches, carelessness and insider attacks. Hence, it
is important to encourage a cyber-aware culture to reduce and manage these risks as well
as prepare for external threats. There are many successful cybersecurity campaigns around
the globe such as Cyber Security November 2017 Awareness campaign from UK parliament
(UK parliament 2017), UTSA Capital Campaign: Cybersecurity Initiatives from The University
of Texas (The University of Texas 2015), Cyber Security Awareness Campaign from Eastern
Michigan University (Eastern Michigan University 2013)
4. COMM2324 Assessment 2 Part A | Project Plan | Page 4
4. Audience:
The project will run in Australia, Vietnam and Barcelona but for the first phase of this
project, we are targeting students and staff members in the Melbourne campuses to
determine the effectiveness of the project.
Demographic:
● Age: 18 - 30
● Gender: All types of genders
● RMIT students.
Geographic:
● Currently study in RMIT Melbourne Campuses.
Psychographic:
● They’re aware of the risks of having data stored online, and know that they’re
vulnerable, but have enough trust that nothing terrible will happen to them. (Alton
2017)
● They still concern about having other people looking or be able to access their
personal information, however, when it comes to a sale, exclusive coupon, they tend
to give their information (personal details, credit card details) easily. (Malcolm
2013).
Behaviour:
● They unknowingly save passwords on computers and re-use the same passwords
which makes them more vulnerable to being hacked.
● They may also unknowingly give out personal information to scams.
● They tend use a lot of technology and social media platforms, thus they may be
oblivious to threats that some platforms may possess.
5. Message:
Our campaign seeks to instil and confront students with the fear of being hacked through a
shocking and frightening approach. Instead of relying on students to find information
themselves, our campaign will interact with students in a way that is more memorable.
6. Objectives:
This campaign will be launched in semester 1 2019, from week 2 to week 12.
- Producing 1 to 2 ambient ad and launch it from week 2 to week 12 in city campus to
gain attention about our campaign.
- Producing a 30-60-second video and run it on social media and screens around
Melbourne’s campuses in semester 1 2019 to raise awareness among RMIT students
about cybersecurity.
- Producing 1 poster/digital poster and run it on social media and screens around
Melbourne’s campuses in semester 1 2019 to engage with RMIT students about
cybersecurity.
5. COMM2324 Assessment 2 Part A | Project Plan | Page 5
7. Stakeholders:
WHO WHY HOW
Office of the Chief
Information Security Officer
RMIT
They are the clients for our
project and we have to
consult with them when
making important decisions.
When they come in for
meetings, we can talk to
them face to face. We can
also arrange appointments
with them either directly
through email or through
Ella.
Students at RMIT They are our target
audience and thus, we need
to involve them and
approach in a way that is
interesting to them.
We can send out surveys
throughout RMIT to get a
variety of opinions. We can
communicate with them
through emails, our ambient
ads and videos
Staff members at RMIT We need to collaborate with
staff members to enable our
project to be effective and
let them know what is going
on.
We can email staff members
with permission of the client
and RMIT. We can
communicate with them
through emails, our ambient
ads and videos
Teaching team We need to discuss and
involve the teaching team in
order to receive feedback
on our project in order to
improve it and acknowledge
that it is going in the right
path.
We would have face-to-face
discussions with the
teaching team or contact
them through email during
after hours.
8. Challenges & Constraints:
Challenges and issues
Challenges Impact on the project Solution plan
Lack of technical skill and
knowledge (for examples:
Some ideas that we came up
with are impossible to carry
Understanding each other’s
strength and weakness.
6. COMM2324 Assessment 2 Part A | Project Plan | Page 6
app/ website coding, IT
skills, etc…)
out. For examples we
intended to have a hacking
experiment for students but
we do not have enough
know-how and time to
conduct.
Simplify our plan or seek
help from other friends.
Time limits We only have a short time to
carry out the campaign. In
the meantime, cybersecurity
is a very different and new
area for us so it takes lots of
time to understand as well as
to do research.
Dividing tasks among the
group, each person will
specialize in a specific area
to help each other
understand about the
terminologies and difficult
knowledge.
Constraints
Constraints Impact on the project Solution plan
Legal/ copyright issues When it comes to
cybersecurity, it’s hard for us
to obtain the legal right to
conduct some ideas for our
campaign such as hacking
mockup.
We have to ensure the
fulfilment of the plan while
complying with
cybersecurity rules.
Students not attending
school regularly at the city
campus
This habit of the millennials
will alter the effectiveness of
the campaign and may result
in false reflection and
statistics.
Never make assumptions
and always back up with
real statistics, surveys and
reliable information
sources.
Cybersecurity resource
limitations
Since cybersecurity involves
private and sensitive
information, we can not get
access to some resources
online.
Try to keep in touch with
our clients and seek for
their help or advice.
Low budget for the
campaign
Some ideas that we came up
with are impossible to carry
out.
Always come up with other
substitute plans that remain
soluble and creative. All the
ideas must be simple yet
original.
7. COMM2324 Assessment 2 Part A | Project Plan | Page 7
9. Point of Difference:
The education and awareness program that RMIT cybersecurity has set up proceeds to
spread awareness through websites, cybersecurity booklets, their social media accounts and
more. However, their ways of communicating has no immediate interaction with students
and relies on students to find the information themselves. For our ideas, we want to
interact with students and lay out the problem in front of them through videos played in
tutorials and appealing ambient ads that instill fear in them so that they will consider the
dangers of cyber breaches. It is unique because our way of approaching students is more
three dimensional and we want them to experience that fear and anxiety of being hacked in
order to take it more seriously.
10. Project Form:
What we are going to produce How we plan to achieve it
1. Ambient Ad
(our ideas are in order of the budget
required from highest to lowest)
Elevator
- There are several options for our
first idea of an ambient ad and it is
to be located in specific elevators in
RMIT.
- The first idea is to replace the
mirrors in the elevator with screens
that will be able to screen a video or
an interactive display that will
attract the attention of people.
- The reason we chose an elevator is
that it is fairly public however during
the short period of time in silence in
the elevator we will be able to
engage them with our message.
- The second idea is to have an
ambient ad on the elevator doors.
As our content and text have yet to
be finalised, it is definite that we will
be incorporating our symbol ‘the
eye’ that represents the threats of
being hacked. We plan for the
opening and closing of the doors to
signify the message of awareness
towards cybersecurity.
Webcam cover
8. COMM2324 Assessment 2 Part A | Project Plan | Page 8
- We will be creating samples of
webcam covers that we plan to
place on the computers around
RMIT. The design of the cover will
be half a solid sticker and the other
half will be ‘the eye’ symbol. The
cover will come with a leaflet that
contains information and resources
as to how we can prevent scams and
hacking.
Bathroom
- The bathroom is an enclosed space
in which an individual would feel as
though they have privacy, this will
represent the level of privacy which
is hard to achieve in the online
world.
- The way we plan to achieve this is to
place posters in strategic areas (eg.
on the back of a cubicle door,
mirror, along with the walls). The
posters will contain ‘the eye’ which
symbolises the eyes watching every
action made online.
2. Video - The content of this video will be
visual and informative of the behind
of the scenes and the real-life
experiences and circumstances of
not protecting your personal details
online. The video will consist of
screen recordings of daily
conversations revealing personal
information, scams that we
encounter and showing students the
9. COMM2324 Assessment 2 Part A | Project Plan | Page 9
consequences of not being cyber
aware.
- We intend for this video to be a fear
factor based, as we want students
and viewers to treat it as a wake-up
call.
- CCTV-liked footage will be made, to
signify ‘always being watched’. This
ties in with our symbol ‘the eye’ to
visually give the impression that
there is always someone watching.
- a back to back scene of two people
on their computer, complete
strangers doing their respective
things, however unaware that one
of them is a hacker.
3. Poster - The poster will be visual appealing
with simple and original copy that is
easy to remember and catchy. The
characteristic and graphic design
(The posters will contain ‘the eye’
which symbolises the eyes watching
every action made online) on the
poster will be similar to the ambient
ads so that all of the IMC tools are
linked, creating consistent identity
for the whole campaign.
- This poster will be a fear factor
based.
- We plan to distribute the digital
version of the poster by display it on
the screen around campus. We also
place the print version at common
space around campus including
library, toilet, dining hall, etc...
10. COMM2324 Assessment 2 Part A | Project Plan | Page 10
Appendix A: Production Plan:
Link:
https://docs.google.com/spreadsheets/d/1sPsHjDXCjMI8XwO956eL_jBeuBMx3d2capd5PJeL
jQg/edit?usp=sharing
Appendix B: Project Ideation:
Mind map
15. COMM2324 Assessment 2 Part A | Project Plan | Page 15
References:
Alton L 2017, ‘How Millennials Think Differently About Online Security’, Forbes, viewed 20
August 2018, <https://www.forbes.com/sites/larryalton/2017/12/01/how-millennials-think-
differently-about-online-security/#756492e4705f>.
Astin G 2018, ‘How Australian universities can get better at cyber security’, University of
New South Wales, viewed 20 August 2018, <https://newsroom.unsw.edu.au/news/science-
tech/how-australian-universities-can-get-better-cyber-security>
Eastern Michigan University 2013, ‘Cyber Security Awareness’, Eastern Michigan University,
viewed 20 August 2018,
<https://www.emich.edu/it/security/initiatives/cybersac/cybersac.php>
Malcolm H 2013, ‘Millennials don’t worry about online privacy’, USA Today, viewed 20
August 2018, <https://www.usatoday.com/story/money/business/2013/04/21/millennials-
personal-info-online/2087989/>.
The University of Texas 2015, ‘UTSA raises $180 million in first-ever capital campaign,
exceeds goal by more than $60 million’, The University of Texas, viewed 20 August 2018,
<http://www.utsa.edu/today/2015/10/capitalcampaign.html>
UK parliament 2017, ‘Cyber Security’, UK parliament, viewed 20 August 2018,
<https://www.parliament.uk/mps-lords-and-offices/offices/bicameral/parliamentary-
digital-service/cyber-security/>