Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Access to Information | 4 |
Computer Security | 4 |
Program Effectiveness | 4 |
Information Security | 2 |
Information Technology | 2 |
Internet | 2 |
Risk | 2 |
Adolescents | 1 |
Adults | 1 |
Attitudes | 1 |
Classification | 1 |
More ▼ |
Author
Acquisti, Alessandro | 1 |
Amin, Rohan Mahesh | 1 |
Aytaç, Tufan | 1 |
Erdem, Mustafa | 1 |
Gafni, Ruti | 1 |
Nagar, Idan | 1 |
Romanosky, Sasha | 1 |
Telang, Rahul | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Dissertations/Theses -… | 1 |
Education Level
Adult Education | 1 |
High Schools | 1 |
Higher Education | 1 |
Secondary Education | 1 |
Audience
Location
Turkey (Ankara) | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Gafni, Ruti; Nagar, Idan – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2016
CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…
Descriptors: Program Effectiveness, Learning Disabilities, Questionnaires, Problem Solving
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro – Journal of Policy Analysis and Management, 2011
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
Descriptors: Identification (Psychology), Access to Information, Deception, Computer Security
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis