Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 9 |
Electronic Mail | 9 |
Deception | 5 |
Information Security | 5 |
Foreign Countries | 3 |
Internet | 3 |
Knowledge Level | 3 |
Users (Information) | 3 |
Higher Education | 2 |
Telecommunications | 2 |
Universities | 2 |
More ▼ |
Source
Journal of Cybersecurity… | 4 |
Africa Education Review | 1 |
Applied Cognitive Psychology | 1 |
Education and Information… | 1 |
Metacognition and Learning | 1 |
Author
Biros, David | 1 |
Black, Jeffrey | 1 |
Burkman, Jim | 1 |
Canfield, Casey Inez | 1 |
Casagrande, Marco | 1 |
Conti, Mauro | 1 |
Daengsi, Therdpong | 1 |
Davis, Alex | 1 |
Fedeli, Monica | 1 |
Fischhoff, Baruch | 1 |
Harris, Maggie W. | 1 |
More ▼ |
Publication Type
Reports - Research | 9 |
Journal Articles | 8 |
Tests/Questionnaires | 2 |
Numerical/Quantitative Data | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Italy | 1 |
South Africa | 1 |
Thailand | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Big Five Inventory | 1 |
What Works Clearinghouse Rating
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Sikolia, David; Biros, David; Zhang, Tianjian – Journal of Cybersecurity Education, Research and Practice, 2023
Prevalent security threats caused by human errors necessitate security education, training, and awareness (SETA) programs in organizations. Despite strong theoretical foundations in behavioral cybersecurity, field evidence on the effectiveness of SETA programs in mitigating actual threats is scarce. Since memory decay will inevitably occur after…
Descriptors: Computer Security, Information Security, Program Effectiveness, Memory
Which Phish Is Captured in the Net? Understanding Phishing Susceptibility and Individual Differences
Sarno, Dawn M.; Harris, Maggie W.; Black, Jeffrey – Applied Cognitive Psychology, 2023
Phishing research presents conflicting findings regarding the psychological predictors of phishing susceptibility. The present work aimed to resolve these discrepancies by utilizing a diverse online sample and email set. Participants completed a survey that included an email classification task and measured several individual differences,…
Descriptors: Computer Security, Electronic Mail, Deception, At Risk Persons
Canfield, Casey Inez; Fischhoff, Baruch; Davis, Alex – Metacognition and Learning, 2019
Every electronic message poses some threat of being a phishing attack. If recipients underestimate that threat, they expose themselves, and those connected to them, to identity theft, ransom, malware, or worse. If recipients overestimate that threat, then they incur needless costs, perhaps reducing their willingness and ability to respond over…
Descriptors: Deception, Electronic Mail, Metacognition, Self Esteem
Daengsi, Therdpong; Pornpongtechavanich, Phisit; Wuttidittachotti, Pongpisit – Education and Information Technologies, 2022
Cybersecurity is crucial at present because cyber threats (e.g., phishing) have become a very common occurrence in everyday life. A literature review showed that there are no studies based on cybersecurity awareness which involved a large number of Thai users. Thus, this research focused on the cybersecurity awareness of approximately 20,000…
Descriptors: Information Security, Computer Security, Employees, Finance Occupations
Luse, Andy; Burkman, Jim – Journal of Cybersecurity Education, Research and Practice, 2021
Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner,…
Descriptors: Computer Security, Information Security, Deception, Student Projects
Pollock, Tommy; Levy, Yair; Li, Wei; Kumar, Ajoy – Journal of Cybersecurity Education, Research and Practice, 2022
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research…
Descriptors: Decision Making, Information Security, Specialists, Users (Information)
Kritzinger, Elmarie – Africa Education Review, 2017
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
Descriptors: School Culture, Foreign Countries, Computer Security, Safety
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases