Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Public Opinion | 5 |
Artificial Intelligence | 2 |
Child Safety | 2 |
Consciousness Raising | 2 |
Guides | 2 |
Internet | 2 |
Misinformation | 2 |
Privacy | 2 |
Social Media | 2 |
Access to Education | 1 |
More ▼ |
Author
Bryson R. Payne | 1 |
Cathryn Allen | 1 |
Chuck Robertson | 1 |
Hare, Karen | 1 |
Jamie Reeves | 1 |
Jenay Robert | 1 |
Kathe Pelletier | 1 |
Mackelprang, Scott | 1 |
Mark McCormack | 1 |
Nichole Arbino | 1 |
Nicole Muscanell | 1 |
More ▼ |
Publication Type
Reports - Research | 3 |
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Adult Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
Kathe Pelletier; Mark McCormack; Nicole Muscanell; Jamie Reeves; Jenay Robert; Nichole Arbino – EDUCAUSE, 2024
In the denouement of the COVID-19 pandemic, talk of a return to "normalcy" in higher education belies the great challenges and ongoing disruptions that yet lie ahead for many institutions. Public perceptions of the value of postsecondary education continue their downward slide, placing institutions in the position of having to…
Descriptors: Trend Analysis, Technology Uses in Education, Educational Technology, Artificial Intelligence
US Department of Homeland Security, 2013
The "Stop.Think.Connect. Community Outreach Toolkit" was adapted from the Federal Trade Commission's "OnGuardOnline.gov," a project that provides practical tips to help guard against Internet fraud and protect your privacy. The kit will help you offer your community information about protecting kids online. It includes "Stop.Think.Connect.," a…
Descriptors: Internet, Computer Security, Computer Mediated Communication, Guides
US Department of Homeland Security, 2011
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
Descriptors: Public Opinion, Consciousness Raising, Computer Security, Child Safety
Hare, Karen – ProQuest LLC, 2008
Implementation of information systems has lagged in many areas of clinical healthcare for a variety of reasons. Economics, data complexity and resistance are among the often quoted roadblocks. Research suggests that physicians play a major part in the adoption, use and diffusion of information technology (IT) in clinical settings. There are also…
Descriptors: Information Needs, Physicians, Information Systems, Information Technology