NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20252
Since 202412
Since 2021 (last 5 years)31
Since 2016 (last 10 years)55
Since 2006 (last 20 years)71
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 71 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Samuel Mergendahl – ProQuest LLC, 2024
While the introduction of memory-safe programming languages into embedded, Cyber-Physical Systems (CPS) offers an opportunity to eliminate many system vulnerabilities, a pragmatic adoption of memory-safe programming languages often necessitates incremental deployment due to practical development constraints, such as the size of many legacy code…
Descriptors: Programming Languages, Information Systems, Information Security, Memory
Peer reviewed Peer reviewed
Direct linkDirect link
John Jerrim – British Journal of Educational Studies, 2023
Young people are facing an ever-increasing array of online dangers. One of the most common is receipt of a phishing email. This paper presents new evidence on the characteristics of young people most likely to respond to such emails. I find approximately one-in-seven 15-year-olds are at risk of responding to a phishing email, rising to one-in-five…
Descriptors: Information Security, Electronic Mail, Crime, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
James McGibney – ProQuest LLC, 2024
This phenomenological study's objective was to review the existing initiatives for cybersecurity awareness and training that are in place for the K-12 education system throughout the United States. Every facet of life is now plagued by the potential, perceived, and real threat of cyber warfare, which includes, but is not limited to, K-12 schools…
Descriptors: Information Security, Computer Security, Crime, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Leticia López-Castro; Mónica López-Ratón; Carolina Rodríguez-Llorente – Elementary School Journal, 2025
The link between technology use and cybervictimization in elementary education is less explored than in secondary education. Increased technology use since COVID-19 and high rates of cybervictimization among elementary students highlight the need to identify early risk factors. This study surveyed 1,169 families of fifth and sixth graders using a…
Descriptors: Crime, Victims, Elementary School Students, COVID-19
Dawn C. Tatum – ProQuest LLC, 2023
Gamification is a term used to describe the art of taking a process or a task and making it into a game. Using games as a way to make mundane tasks or necessary lessons more fun is used in many aspects of life. Parents often use games to teach children tasks, and teachers use games to enforce learning, and much more. The gamification of Security…
Descriptors: Game Based Learning, Information Security, Computer Security, Behavior Patterns
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Peer reviewed Peer reviewed
Direct linkDirect link
Growns, Bethany; Towler, Alice; Dunn, James D.; Salerno, Jessica M.; Schweitzer, N. J.; Dror, Itiel E. – Cognitive Research: Principles and Implications, 2022
Forensic science practitioners compare visual evidence samples (e.g. fingerprints) and decide if they originate from the same person or different people (i.e. fingerprint 'matching'). These tasks are perceptually and cognitively complex--even practising professionals can make errors--and what limited research exists suggests that existing…
Descriptors: Crime, Evidence, Sampling, Statistics Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5