Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 6 |
Computer Software | 6 |
Foreign Countries | 6 |
Information Technology | 4 |
Internet | 4 |
Access to Computers | 3 |
Barriers | 3 |
Business | 3 |
College Students | 3 |
Computer Literacy | 3 |
Educational Environment | 3 |
More ▼ |
Source
RAND Corporation | 2 |
International Association for… | 1 |
Journal of Cybersecurity… | 1 |
Journal of Education for… | 1 |
OCLC Online Computer Library… | 1 |
Author
Botterman, Maarten | 2 |
Cremonini, Leon | 2 |
Ettedgui, Emile | 2 |
Graafland-Essers, Irma | 2 |
Lupton, Robert A. | 1 |
Plachkinova, Miloslava | 1 |
Rawlinson, David R. | 1 |
Storey, Tom, Ed. | 1 |
Vo, Ace | 1 |
Publication Type
Reports - Evaluative | 3 |
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Numerical/Quantitative Data | 1 |
Tests/Questionnaires | 1 |
Education Level
Postsecondary Education | 4 |
Elementary Secondary Education | 3 |
Higher Education | 3 |
Two Year Colleges | 1 |
Audience
Location
United States | 6 |
Germany | 2 |
Japan | 2 |
Switzerland | 2 |
United Kingdom | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Canada | 1 |
China | 1 |
Connecticut | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Rawlinson, David R.; Lupton, Robert A. – Journal of Education for Business, 2007
Students' attitudes and perceptions regarding the use of unlicensed software are important to educators and businesses. Students have a proven propensity to pirate software and other intellectual property. By understanding how attitudes and perceptions toward software piracy differ among university students in a cross-national context, educators…
Descriptors: Student Attitudes, Computer Software, Information Technology, Foreign Countries
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
Graafland-Essers, Irma; Cremonini, Leon; Ettedgui, Emile; Botterman, Maarten – RAND Corporation, 2003
This report presents the current understanding of the advancement of the Information Society within the European Union and countries that are up for accession in 2004, and is based on the SIBIS (Statistical Indicators Benchmarking the Information Society) surveys and analyses per SIBIS theme and country. The report is unique in its coherent and…
Descriptors: Information Technology, Foreign Countries, Technological Advancement, Measurement
Graafland-Essers, Irma; Cremonini, Leon; Ettedgui, Emile; Botterman, Maarten – RAND Corporation, 2003
This report presents the current understanding of the advancement of the Information Society within the European Union and countries that are up for accession in 2004, and is based on the SIBIS (Statistical Indicators Benchmarking the Information Society) surveys and analyses per SIBIS theme and country. The report is unique in its coherent and…
Descriptors: Information Technology, Foreign Countries, Technological Advancement, Measurement
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers