NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
John Jerrim – British Journal of Educational Studies, 2023
Young people are facing an ever-increasing array of online dangers. One of the most common is receipt of a phishing email. This paper presents new evidence on the characteristics of young people most likely to respond to such emails. I find approximately one-in-seven 15-year-olds are at risk of responding to a phishing email, rising to one-in-five…
Descriptors: Information Security, Electronic Mail, Crime, Data Collection
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Chou, Te-Shun; Hempenius, Nicholas – Journal of Cybersecurity Education, Research and Practice, 2020
With the advancement in technology over the past decades, networks have become increasingly large and complex. In the meantime, cyberattacks have become highly sophisticated making them difficult to detect. These changes make securing a network more challenging than ever before. Hence, it is critical to prepare a comprehensive guide of network…
Descriptors: Computer Networks, Computer Security, Information Security, Computer Science Education
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; McCoey, Margaret – International Journal of Information and Communication Technology Education, 2016
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
Descriptors: Ethics, Information Security, Curriculum, Experiential Learning
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security