NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
Kathe Pelletier; Mark McCormack; Nicole Muscanell; Jamie Reeves; Jenay Robert; Nichole Arbino – EDUCAUSE, 2024
In the denouement of the COVID-19 pandemic, talk of a return to "normalcy" in higher education belies the great challenges and ongoing disruptions that yet lie ahead for many institutions. Public perceptions of the value of postsecondary education continue their downward slide, placing institutions in the position of having to…
Descriptors: Trend Analysis, Technology Uses in Education, Educational Technology, Artificial Intelligence