NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Practitioners1
Laws, Policies, & Programs
Social Security1
Assessments and Surveys
Trends in International…1
What Works Clearinghouse Rating
Showing 1 to 15 of 62 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rui Pinto; Rolando Martins; Carlos Novo – Journal of Cybersecurity Education, Research and Practice, 2024
An organization's infrastructure rests upon the premise that cybersecurity professionals have specific knowledge in administrating and protecting it against outside threats. Without this expertise, sensitive information could be leaked to malicious actors and cause damage to critical systems. In order to facilitate this process, the presented work…
Descriptors: Computer Science Education, Information Security, Computer Security, Vignettes
Peer reviewed Peer reviewed
Direct linkDirect link
Ricci, Joseph; Breitinger, Frank; Baggili, Ibrahim – Education and Information Technologies, 2019
Cyberattacks and identity theft are common problems nowadays where researchers often say that humans are the weakest link the security chain. Therefore, this survey focused on analyzing the interest for adults for 'cyber threat eduction seminars', e.g., how to project themselves and their loved ones. Specifically, we asked questions to understand…
Descriptors: Computer Security, Crime, Adults, Seminars
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Barrett, Diane – Information Systems Education Journal, 2020
In a cloud computing environment, traditional digital forensic processes (such as turning off the computer to image the computer hard drive) can be disruptive to businesses because the data of businesses may be co-mingled with other content. As technology changes, the way digital forensics acquisitions are conducted are also changing. The change…
Descriptors: Computer Science Education, Crime, Evidence, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Desmet, Ophélie A.; Crimmins, Danielle M.; Flewellen, Gerniya; Seigfried-Spellar, Kathryn C. – Gifted Child Today, 2023
The purpose of the present study was to evaluate a cybersecurity and digital forensics enrichment program for gifted and talented students to determine students' perceptions of this enrichment course. We evaluated data from 25 secondary education students and one educator to examine their perceptions of the program. Responses from students and the…
Descriptors: Academically Gifted, Secondary School Students, Student Attitudes, Program Evaluation
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Haywood, M. Elizabeth – Journal of Information Systems Education, 2021
ISACA, a non-profit, independent association that advocates for professionals involved in information security, assurance, risk management, and governance, recently updated its IT governance framework, Control Objectives for Information and Related Technology (COBIT). COBIT 2019 presents a logical approach to information technology and policy…
Descriptors: Community Colleges, Crime, Computer Security, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Schwieger, Dana; Ladwig, Christine – Information Systems Education Journal, 2022
As the twenty-first century advances technologically, the era is also becoming notorious for the rise of organized cybercrime and attacks on business information and operations. Company data and intellectual property are considered the "New Oil" that generates value for organizations and their constituents. With the escalating number of…
Descriptors: Computer Security, Crime, Insurance, Intellectual Property
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
Direct linkDirect link
Lim, Alliyza; Brewer, Neil; Young, Robyn L. – Journal of Autism and Developmental Disorders, 2023
Reports of cybercrime being committed by people on the autism spectrum often imply that autism may be more prevalent among cybercriminals than the general population, although this remains unproven. In an online survey of 302 participants, we found that autistic individuals (n = 25) were more likely to report engagement in cybercrime than…
Descriptors: Crime, Internet, Information Security, Autism Spectrum Disorders
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5