Publication Date
In 2025 | 0 |
Since 2024 | 4 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 16 |
Since 2006 (last 20 years) | 40 |
Descriptor
Source
Author
Harry May | 2 |
Panettieri, Joseph C. | 2 |
Travis Atkison | 2 |
Villano, Matt | 2 |
Ankur Chattopadhyay | 1 |
Annessi, Robert | 1 |
Archer, Ricky | 1 |
Astrom, Peik | 1 |
Battisti, F. | 1 |
Beasley, William | 1 |
Bellos, Nephellie | 1 |
More ▼ |
Publication Type
Journal Articles | 59 |
Reports - Descriptive | 35 |
Reports - Research | 17 |
Opinion Papers | 3 |
Reports - Evaluative | 3 |
Collected Works - Serial | 1 |
Information Analyses | 1 |
Reports - General | 1 |
Education Level
Higher Education | 29 |
Postsecondary Education | 12 |
Secondary Education | 3 |
Elementary Secondary Education | 2 |
Middle Schools | 2 |
Elementary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Two Year Colleges | 1 |
Location
California | 4 |
Finland | 2 |
Indiana | 2 |
North Carolina | 2 |
Texas | 2 |
Australia | 1 |
Austria (Vienna) | 1 |
Brazil | 1 |
France | 1 |
Hawaii | 1 |
Illinois | 1 |
More ▼ |
Laws, Policies, & Programs
Telecommunications Act 1996 | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Jamal, Bakht; Rizvi, Syed Asad Abbas – Pakistan Journal of Distance and Online Learning, 2023
This paper intended to analyze the practices of digital citizenship among university student in Pakistan. The quantitative descriptive survey research design was adopted for this study. The population of the study was 800 students of BS (Education) program in ten public sector universities in Punjab, Pakistan. Simple random sampling technique was…
Descriptors: Foreign Countries, Technological Literacy, College Students, Computer Use
Chin, Amita; Jones, Beth; Little, Philip – International Journal of Education and Development using Information and Communication Technology, 2021
This study on smartphone security behaviors and practices is a continuation of the work in Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive university were compared to results from a 2014 survey at the same institution. That study found that students continued to be lax in their mobile security practices.…
Descriptors: Telecommunications, Handheld Devices, Computer Security, Student Attitudes
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security
Gökçe, Kevser Gülnur; Dogerlioglu, Ozgur – Knowledge Management & E-Learning, 2019
Bring Your Own Device (BYOD) policy, which allows employees to use their own mobile devices for work and connection to their corporate network, is getting popular in enterprises. While companies want to improve the efficiency and productivity of employees, employees prefer to use their own devices at work, which make them feel more comfortable and…
Descriptors: Handheld Devices, Internet, Computer Security, Administrators
Pollock, Tommy; Levy, Yair; Li, Wei; Kumar, Ajoy – Journal of Cybersecurity Education, Research and Practice, 2022
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research…
Descriptors: Decision Making, Information Security, Specialists, Users (Information)
Willy Ochaya – International Journal of Online Graduate Education, 2018
Cyberattacks have a similar global economic impact of a natural disaster such as Hurricane Katrina, according to Lloyds, the world's specialist insurance market of London report. According to Lloyd's of London, global cyberattacks pose a considerable risk to businesses, health service, and education, resulting in average economic losses of between…
Descriptors: Computer Security, Internet, Electronic Learning, Handheld Devices
Kaikho Ashuni – Asian Journal of Distance Education, 2024
The digital age has opened up new and exciting opportunities for Open and Distance Learning (ODL) in universities. But, is going digital reinforcing the existing social inequalities? This qualitative research examines the three levels of digital divide and digital inequality among learners at India's National Open University, IGNOU. The findings…
Descriptors: Distance Education, Open Education, Open Universities, Social Justice
Tosun, Nilgün – Journal of Education and Training Studies, 2018
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Social Media
Next Generation of Evidence Collecting: The Need for Digital Forensics in Criminal Justice Education
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Chiner, Esther; Gómez-Puerta, Marcos; Cardona-Moltó, María Cristina – British Journal of Learning Disabilities, 2017
Background: Internet offers opportunities to people with intellectual disabilities, but it also involves some risks. The aim of this study was to explore these issues considering caregivers and people with intellectual disabilities' perspectives. Materials and Methods: A descriptive, cross-sectional study was conducted. The sample consisted of 77…
Descriptors: Internet, Intellectual Disability, Caregivers, Attitude Measures
Zseby, Tanja; Vázquez, Félix Iglesias; Bernhardt, Valentin; Frkat, Davor; Annessi, Robert – IEEE Transactions on Education, 2016
This paper presents a network security laboratory to teach data analysis for detecting TCP/IP covert channels. The laboratory is mainly designed for students of electrical engineering, but is open to students of other technical disciplines with similar background. Covert channels provide a method for leaking data from protected systems, which is a…
Descriptors: Engineering Education, Telecommunications, Computer Security, Laboratories
Kritzinger, Elmarie – Africa Education Review, 2017
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
Descriptors: School Culture, Foreign Countries, Computer Security, Safety