Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 2 |
Decision Making | 2 |
Identification | 2 |
Information Security | 2 |
Accuracy | 1 |
Acoustics | 1 |
Artificial Intelligence | 1 |
Deception | 1 |
Delphi Technique | 1 |
Electronic Mail | 1 |
Environmental Influences | 1 |
More ▼ |
Source
Journal of Cybersecurity… | 2 |
Author
Bryson R. Payne | 1 |
Cathryn Allen | 1 |
Chuck Robertson | 1 |
Kumar, Ajoy | 1 |
Levy, Yair | 1 |
Li, Wei | 1 |
Pollock, Tommy | 1 |
Tamirat Abegaz | 1 |
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Pollock, Tommy; Levy, Yair; Li, Wei; Kumar, Ajoy – Journal of Cybersecurity Education, Research and Practice, 2022
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research…
Descriptors: Decision Making, Information Security, Specialists, Users (Information)