Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 5 |
Descriptor
Accuracy | 5 |
Computer Security | 5 |
Artificial Intelligence | 3 |
Computer Assisted Testing | 2 |
Deception | 2 |
Identification | 2 |
Information Security | 2 |
Reliability | 2 |
Active Learning | 1 |
Benchmarking | 1 |
Best Practices | 1 |
More ▼ |
Source
ProQuest LLC | 2 |
ETS Research Report Series | 1 |
IEEE Transactions on Learning… | 1 |
Journal of Cybersecurity… | 1 |
Author
Bryson R. Payne | 1 |
Caramancion, Kevin Matthe | 1 |
Cathryn Allen | 1 |
Choi, Ikkyu | 1 |
Chuck Robertson | 1 |
Deane, Paul | 1 |
Hao, Jiangang | 1 |
Huaibo Wang | 1 |
Kishor Datta Gupta | 1 |
Qianta Zhu | 1 |
Qinhua Zheng | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Dissertations/Theses -… | 2 |
Education Level
Adult Education | 1 |
High School Equivalency… | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Caramancion, Kevin Matthe – ProQuest LLC, 2022
Misinformation and Disinformation, both types of Information Disorder in the cyber world, operate on a systemic level. Several factors enabling their persistence, including laws, policies, and technological mediators, have been investigated in the literature. Cybersecurity frameworks and guidelines specify that the target victims, as part of the…
Descriptors: Interdisciplinary Approach, Information Literacy, Consciousness Raising, Computer Security
Yishen Song; Qianta Zhu; Huaibo Wang; Qinhua Zheng – IEEE Transactions on Learning Technologies, 2024
Manually scoring and revising student essays has long been a time-consuming task for educators. With the rise of natural language processing techniques, automated essay scoring (AES) and automated essay revising (AER) have emerged to alleviate this burden. However, current AES and AER models require large amounts of training data and lack…
Descriptors: Scoring, Essays, Writing Evaluation, Computer Software
Kishor Datta Gupta – ProQuest LLC, 2021
Defenses against adversarial attacks are essential to ensure the reliability of machine learning models as their applications are expanding in different domains. Existing ML defense techniques have several limitations in practical use. I proposed a trustworthy framework that employs an adaptive strategy to inspect both inputs and decisions. In…
Descriptors: Artificial Intelligence, Cybernetics, Information Processing, Information Security
Choi, Ikkyu; Hao, Jiangang; Deane, Paul; Zhang, Mo – ETS Research Report Series, 2021
"Biometrics" are physical or behavioral human characteristics that can be used to identify a person. It is widely known that keystroke or typing dynamics for short, fixed texts (e.g., passwords) could serve as a behavioral biometric. In this study, we investigate whether keystroke data from essay responses can lead to a reliable…
Descriptors: Accuracy, High Stakes Tests, Writing Tests, Benchmarking