Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Access to Information | 4 |
| Computer Security | 4 |
| Program Effectiveness | 4 |
| Information Security | 2 |
| Information Technology | 2 |
| Internet | 2 |
| Risk | 2 |
| Adolescents | 1 |
| Adults | 1 |
| Attitudes | 1 |
| Classification | 1 |
| More ▼ | |
Author
| Acquisti, Alessandro | 1 |
| Amin, Rohan Mahesh | 1 |
| Aytaç, Tufan | 1 |
| Erdem, Mustafa | 1 |
| Gafni, Ruti | 1 |
| Nagar, Idan | 1 |
| Romanosky, Sasha | 1 |
| Telang, Rahul | 1 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
| Dissertations/Theses -… | 1 |
Education Level
| Adult Education | 1 |
| High Schools | 1 |
| Higher Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Turkey (Ankara) | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Gafni, Ruti; Nagar, Idan – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2016
CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…
Descriptors: Program Effectiveness, Learning Disabilities, Questionnaires, Problem Solving
Romanosky, Sasha; Telang, Rahul; Acquisti, Alessandro – Journal of Policy Analysis and Management, 2011
In the United States, identity theft resulted in corporate and consumer losses of $56 billion dollars in 2005, with up to 35 percent of known identity thefts caused by corporate data breaches. Many states have responded by adopting data breach disclosure laws that require firms to notify consumers if their personal information has been lost or…
Descriptors: Identification (Psychology), Access to Information, Deception, Computer Security
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Peer reviewed
Direct link
