Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Informed Consent | 4 |
Deception | 2 |
Ethics | 2 |
Privacy | 2 |
Social Networks | 2 |
Access to Information | 1 |
Adolescents | 1 |
Aesthetics | 1 |
Affective Behavior | 1 |
Age | 1 |
More ▼ |
Author
Baranauskas, M. Cecilia C. | 1 |
Black, Jeffrey | 1 |
Dittrich, David | 1 |
Harris, Maggie W. | 1 |
Mari-Liisa Parder | 1 |
Marten Juurik | 1 |
Pereira, Roberto | 1 |
Pieter Gryffroy | 1 |
Sarno, Dawn M. | 1 |
da Silva, Sergio Roberto P. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Information Analyses | 1 |
Education Level
Audience
Location
Europe | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Big Five Inventory | 1 |
What Works Clearinghouse Rating
Mari-Liisa Parder; Pieter Gryffroy; Marten Juurik – Research Ethics, 2024
The growing importance of researching online activities, such as cyber-deviance and cyber-crime, as well as the use of online tools (e.g. questionnaires, games, and other interactive tools) has created new ethical and legal challenges for researchers, which can be even more complicated when researching adolescents. In this article, we highlight…
Descriptors: Foreign Countries, Crime Prevention, Ethics, Computer Security
Which Phish Is Captured in the Net? Understanding Phishing Susceptibility and Individual Differences
Sarno, Dawn M.; Harris, Maggie W.; Black, Jeffrey – Applied Cognitive Psychology, 2023
Phishing research presents conflicting findings regarding the psychological predictors of phishing susceptibility. The present work aimed to resolve these discrepancies by utilizing a diverse online sample and email set. Participants completed a survey that included an email classification task and measured several individual differences,…
Descriptors: Computer Security, Electronic Mail, Deception, At Risk Persons
Dittrich, David – Research Ethics, 2015
This paper considers some of the ethical issues surrounding the study of malicious activity in social networks, specifically using a technique known as "social honeypots" combined with the use of deception. This is a potentially touchy area of study that is common to social and behavioral research that is well understood to fall within…
Descriptors: Social Networks, Social Media, Ethics, Deception
Pereira, Roberto; Baranauskas, M. Cecilia C.; da Silva, Sergio Roberto P. – Educational Technology & Society, 2013
Social software is a growing reality worldwide and several authors are discussing its use to promote social interaction in learning contexts. Although problems regarding privacy, reputation, and identity are commonly reported in social software, an explicit concern regarding peoples' values is not a common practice in its design and adoption,…
Descriptors: Social Networks, Computer Software, Semiotics, Values