Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 2 |
Terrorism | 2 |
Computer Software | 1 |
Conflict | 1 |
Constitutional Law | 1 |
Copyrights | 1 |
Credit (Finance) | 1 |
Crime | 1 |
Crime Prevention | 1 |
Criminals | 1 |
Economic Factors | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Two Year Colleges | 1 |
Audience
Location
Iran | 1 |
Pennsylvania | 1 |
Ukraine | 1 |
United States | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing