NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Research18
Journal Articles16
Audience
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 18 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Agarsha Manoharan; Abiniah Sriskantharajah; H. M. K. K. M. B. Herath; L. G. P. K. Guruge; S. L. P. Yasakethu – Education and Information Technologies, 2025
MetaHuman technology's development and the Metaverse's growth have transformed virtual interactions and brought up new cybersecurity risks. This research provides cybersecurity awareness education tools for phishing attacks in the metaverse realm that use MetaHuman avatars, which turned out to be more dishonest than conventional phishing…
Descriptors: Information Security, Computer Security, Computer Simulation, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Leticia López-Castro; Mónica López-Ratón; Carolina Rodríguez-Llorente – Elementary School Journal, 2025
The link between technology use and cybervictimization in elementary education is less explored than in secondary education. Increased technology use since COVID-19 and high rates of cybervictimization among elementary students highlight the need to identify early risk factors. This study surveyed 1,169 families of fifth and sixth graders using a…
Descriptors: Crime, Victims, Elementary School Students, COVID-19
Peer reviewed Peer reviewed
Direct linkDirect link
Growns, Bethany; Towler, Alice; Dunn, James D.; Salerno, Jessica M.; Schweitzer, N. J.; Dror, Itiel E. – Cognitive Research: Principles and Implications, 2022
Forensic science practitioners compare visual evidence samples (e.g. fingerprints) and decide if they originate from the same person or different people (i.e. fingerprint 'matching'). These tasks are perceptually and cognitively complex--even practising professionals can make errors--and what limited research exists suggests that existing…
Descriptors: Crime, Evidence, Sampling, Statistics Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Haywood, M. Elizabeth – Journal of Information Systems Education, 2021
ISACA, a non-profit, independent association that advocates for professionals involved in information security, assurance, risk management, and governance, recently updated its IT governance framework, Control Objectives for Information and Related Technology (COBIT). COBIT 2019 presents a logical approach to information technology and policy…
Descriptors: Community Colleges, Crime, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Chander, Romesh; Dhar, Meghna; Bhatt, Ketan – Journal of Access Services, 2022
With the rising cases of theft, vandalism, mutilation, infiltration, and other fraudulent practices at academic libraries, the matter of library security has become a matter of greater concern for modern-day library professionals as well as scholars in the field of library and information science. Considering the seriousness of the issue, the…
Descriptors: Bibliometrics, Academic Libraries, Information Security, Crime
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Lim, Alliyza; Brewer, Neil; Young, Robyn L. – Journal of Autism and Developmental Disorders, 2023
Reports of cybercrime being committed by people on the autism spectrum often imply that autism may be more prevalent among cybercriminals than the general population, although this remains unproven. In an online survey of 302 participants, we found that autistic individuals (n = 25) were more likely to report engagement in cybercrime than…
Descriptors: Crime, Internet, Information Security, Autism Spectrum Disorders
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Abhishek Vaish; Ravindra Kumar; Samo Bobek; Simona Sternad – Journal of Cybersecurity Education, Research and Practice, 2024
The cyber security education market has grownup exponentially, with a CAGR of 13.9 % as reported by Data Intelo. The report published by the World Economic Forum 2023 indicates a shortfall of 2.27 million cyber security experts in 2021 across different roles and hence manifest that Skill-based cyber security education is the need of the hour.…
Descriptors: Experiential Learning, Computer Networks, Information Security, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tosun, Nilgün; Altinöz, Murat; Çay, Emil; Çinkiliç, Turan; Gülseçen, Sevinç; Yildirim, Tülay; Aydin, Muhammed Ali; Metin, Bilgin; Ayvaz Reis, Zerrin; Ünlü, Nafiz – International Journal of Curriculum and Instruction, 2020
Internet is a cyber-ambient where the number of users is increasing consistently as a result of wide opportunities those are provided and where access can be ensured with information technologies. Today, via internet and social media where the number of users reaches billions, the samples of committed cybercrimes and cyber-attacks are increasing…
Descriptors: Foreign Countries, Internet, Social Media, Computer Mediated Communication
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Betz-Hamilton, Axton – Journal of Financial Counseling and Planning, 2020
In 2017, more than one million children became identity theft victims. Many perpetrators of child identity theft are parents, but there are limited data on these perpetrators. The purpose of this study was to understand parental perpetrators of child identity theft through the experiences of victims. Using a phenomenological approach, six adult…
Descriptors: Victims, Information Security, Crime, Money Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tosun, Nilgün – Journal of Education and Training Studies, 2018
Technology is in a constantly evolving and changing structure since the existence of mankind. Because of this dynamic structure, technology fulfills a number of functions such as facilitating people's lives, time, profit from work, profit from cost, making life more enjoyable. At the same time, technology is used in all areas of life, and it also…
Descriptors: Educational Technology, Technology Uses in Education, Internet, Social Media
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H. – Journal of Cybersecurity Education, Research and Practice, 2019
Digital forensics poses significant challenges to law enforcement as the information found in a computer system is often present at most crime scenes in the form of computer data and cell phones. Digital evidence contained on common devices, such as cell phones and laptops, includes information that can be pertinent to the investigation of crimes.…
Descriptors: Crime, Information Technology, Law Enforcement, Computer Security
Office of Inspector General, US Department of Education, 2023
In accordance with the Reports Consolidation Act of 2000, the OIG reports annually on the most serious management and performance challenges the Department faces. For FY 2024, we identified seven management challenges for the Department: (1) Implementing pandemic relief laws for elementary and secondary education; (2) Implementing pandemic relief…
Descriptors: Federal Programs, Educational Finance, Student Financial Aid, Pandemics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Togaibaeva, Sholpan S.; Togaibaev, Amir I.; Khanov, Talgat A.; Sikhimbayev, Muratbay R.; Rustemova, Gaukhar R. – International Journal of Environmental and Science Education, 2016
The article considers the analysis of a crime under rule 230 of the Criminal code of the Republic of Kazakhstan (illegal actions in relation to insider information). The authors discuss the concept of insider information, the interpretation to the possibility of its misuse. A brief analysis of the object and the subject of insider information is…
Descriptors: Foreign Countries, Crime, Crime Prevention, Legal Responsibility
Previous Page | Next Page »
Pages: 1  |  2