Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
College Students | 6 |
Computer Security | 6 |
Data Collection | 6 |
Information Technology | 5 |
College Faculty | 4 |
Computer Networks | 3 |
Computer Software | 3 |
Foreign Countries | 3 |
Higher Education | 3 |
Information Security | 3 |
Access to Information | 2 |
More ▼ |
Source
Contemporary Issues in… | 1 |
EDUCAUSE | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
Journal of Cybersecurity… | 1 |
ProQuest LLC | 1 |
Author
Brooks, Rochelle | 1 |
Casagrande, Marco | 1 |
Conti, Mauro | 1 |
Fedeli, Monica | 1 |
Flinn, Michael Bradley | 1 |
Hawkins, Brian L. | 1 |
Howard, Elizabeth V. | 1 |
Losiouk, Eleonora | 1 |
Rudy, Julia A. | 1 |
Woods, David M. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Numerical/Quantitative Data | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Elementary Secondary Education | 1 |
Audience
Location
Italy | 2 |
Ohio | 2 |
United States | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Flinn, Michael Bradley – ProQuest LLC, 2009
With privacy concerns growing on a daily basis, it is important to understand how college students guard their personally identifiable information. Despite the students' perceived readiness and several studies on the topic, it is not fully understood what personally identifiable information college students are sharing via online social networks…
Descriptors: College Students, Internet, Social Networks, Grade Point Average
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers