NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Type
Reports - Research14
Journal Articles12
Legal/Legislative/Regulatory…1
Audience
Policymakers1
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 14 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Peter Draus; Sushma Mishra; Kevin Slonka; Natalya Bromall – Information Systems Education Journal, 2024
There is a significant skill gap, with millions of cybersecurity jobs still needing to be fulfilled due to a lack of a trained workforce. Various academic programs are available that teach students in different aspects of cybersecurity. This paper investigates if the title of an IT program has any impact on the desirability of a program and if…
Descriptors: College Students, Information Technology, Information Security, Cybernetics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Tsado, Lucy; Kim, Jung Seob – Journal of Cybersecurity Education, Research and Practice, 2022
Private-sector and public-sector organizations have increasingly built specific business units for securing company assets, reputation, and lives, known as "security operations centers" (SOCs). Depending on the organization, these centers may also be referred to as global security operations centers, "cybersecurity" operations…
Descriptors: Computer Security, Information Security, Higher Education, Liberal Arts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kirk, Sarah; Foreman, Daniel; Lee, Cody; Beasley, Shannon W. – Journal of Cybersecurity Education, Research and Practice, 2019
The goal of this research is to describe an active learning opportunity that was conducted as a community service offering through our Center for Cybersecurity Education and Applied Research (CCEAR). As a secondary goal, the participants sought to gain real world experience by applying techniques and concepts studied in security classes. A local…
Descriptors: Active Learning, Computer Security, Information Security, Access to Information
Marinos, Nick – US Government Accountability Office, 2021
When the COVID-19 pandemic forced the closure of schools across the nation, many K-12 schools moved from in-person to remote education, increasing their dependence on IT and making them potentially more vulnerable to cyberattacks. Education Facilities, including K-12 schools, is one of the nation's critical infrastructure subsectors. Several…
Descriptors: COVID-19, Pandemics, School Closing, Online Courses
Peer reviewed Peer reviewed
Direct linkDirect link
Kabadayi, Fedai; Sari, Serkan V. – Journal of Psychologists and Counsellors in Schools, 2018
This study examined the role of resilience in the lives of cyberbullying perpetrators and their victims. Turkish adolescents (n = 444; 245 girls, 55.2%, and 199 boys, 44.8%) 15-19 years of age (mean age of 16.58 years, SD = 0.789) were recruited from different high schools. The participants completed the Cyberbullying Scale (Aricak, Kinay, &…
Descriptors: Resilience (Psychology), Bullying, Computer Security, Victims
Peer reviewed Peer reviewed
Direct linkDirect link
Plachkinova, Miloslava; Maurer, Chris – Journal of Information Systems Education, 2018
This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…
Descriptors: Information Security, Information Systems, Case Method (Teaching Technique), Online Vendors
Peer reviewed Peer reviewed
Direct linkDirect link
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond – Education and Information Technologies, 2015
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Descriptors: Foreign Countries, Crime, Computer Security, Crime Prevention
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Stauffer, Sterling; Heath, Melissa Allen; Coyne, Sarah Marie; Ferrin, Scott – Psychology in the Schools, 2012
Recent meta-analyses indicate that bully prevention programs produce minimal change in student behavior. This study examined 66 high school teachers' perceptions regarding the effect of cyberbullying on students, which intervening strategies teachers would use when dealing with cyberbullying, and which prevention strategies would assist in…
Descriptors: Prevention, Intervention, Student Behavior, Fidelity
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, Doohwang; Larose, Robert; Rifon, Nora – Behaviour & Information Technology, 2008
The objective of this study is to develop and test a model of online protection behaviour, particularly regarding the use of virus protection. Hypotheses are proposed concerning the predictors of the intention to engage in virus protection behaviour. Using a survey of 273 college students who use the Internet, a test of the hypotheses is conducted…
Descriptors: Self Efficacy, Intention, Computer Security, Multiple Regression Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Norum, Pamela S.; Weagley, Robert O. – Journal of Educational Technology Systems, 2007
The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…
Descriptors: College Students, Risk, Multivariate Analysis, Internet