Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Mediated… | 9 |
Computer Security | 9 |
Electronic Mail | 9 |
Internet | 5 |
Computer Uses in Education | 4 |
Access to Information | 3 |
Classification | 3 |
Information Technology | 3 |
Safety | 3 |
Teaching Methods | 3 |
Web Sites | 3 |
More ▼ |
Source
ProQuest LLC | 2 |
Black Issues in Higher… | 1 |
Chronicle of Higher Education | 1 |
Jossey-Bass, An Imprint of… | 1 |
Journal of Technical Writing… | 1 |
Learning & Leading with… | 1 |
Online Submission | 1 |
Author
Amin, Rohan Mahesh | 1 |
Brown, Abbie | 1 |
Goldsborough, Reid | 1 |
Green, Tim | 1 |
Hogle, Jan G. | 1 |
Johnson, Doug | 1 |
McCollum, Kelly | 1 |
Olagunju, Amos O. | 1 |
Park, Insu | 1 |
Robinson, LeAnne K. | 1 |
Ross, Derek G. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 6 |
Journal Articles | 4 |
Dissertations/Theses -… | 2 |
Books | 1 |
Guides - Classroom - Teacher | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
New York | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ross, Derek G. – Journal of Technical Writing and Communication, 2009
Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters--modern perversions of "ars dictaminis" (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the…
Descriptors: Letters (Correspondence), Rhetoric, Rhetorical Criticism, Electronic Mail
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Goldsborough, Reid – Black Issues in Higher Education, 2004
There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…
Descriptors: Internet, Electronic Mail, Computer Mediated Communication, Computer Security
Olagunju, Amos O. – Online Submission, 2008
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…
Descriptors: Safety, Parent Participation, Parent Role, Parent School Relationship
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Hogle, Jan G. – 1996
This document is a printed copy of the Web site written to educate Internet users about potential risks associated with communication over the Internet, and to suggest precautions to reduce those risks. An Introduction highlights why users should care about privacy on the Internet, activities that can reveal personal information to others, and…
Descriptors: Computer Mediated Communication, Computer Security, Discussion Groups, Electronic Mail
McCollum, Kelly – Chronicle of Higher Education, 1999
Colleges and universities are finding that ways to misbehave in computer-mediated communication come along faster than institutions can create policies to deal with them. Although most schools have acceptable-use policies, technological advances change the environment quickly and require flexible policies. Most institutions have created a mix of…
Descriptors: Administrative Policy, Computer Mediated Communication, Computer Networks, Computer Security