Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Computer Software | 7 |
Vandalism | 7 |
Privacy | 6 |
Crime | 3 |
Crime Prevention | 3 |
Computers | 2 |
Information Security | 2 |
Models | 2 |
Program Effectiveness | 2 |
Safety | 2 |
More ▼ |
Author
Brigitte Suter | 1 |
Dana Kube | 1 |
Giovanni Bryan Jamal McKinney | 1 |
Hendrik Drachsler | 1 |
Huang, Phil | 1 |
Jabbour, Ghassan | 1 |
Joshua Weidlich | 1 |
Karel Kreijns | 1 |
Roberts, Gary | 1 |
Sebastian Gombert | 1 |
Waters, John K. | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 3 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 1 |
Secondary Education | 1 |
Audience
Media Staff | 2 |
Location
Minnesota | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Dana Kube; Sebastian Gombert; Brigitte Suter; Joshua Weidlich; Karel Kreijns; Hendrik Drachsler – Journal of Computer Assisted Learning, 2024
Background: Gender stereotypes about women and men are prevalent in computer science (CS). The study's goal was to investigate the role of gender bias in computer-supported collaborative learning (CSCL) in a CS context by elaborating on gendered experiences in the perception of individual and team performance in mixed-gender teams in a hackathon.…
Descriptors: Cooperative Learning, Computer Assisted Instruction, Gender Issues, Learning Activities
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Waters, John K. – T.H.E. Journal, 2011
The need to maintain an unpolluted learning environment is no easy task for schools and districts that have incorporated social networking sites into their educational life. The staff and teachers at Blaine High School in Minnesota's Anoka-Hennepin District 11 had been considering the pros and cons of establishing a school Facebook page when the…
Descriptors: Social Networks, Web Sites, Educational Environment, High Schools
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks