Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 6 |
Victims of Crime | 6 |
Crime | 3 |
Higher Education | 2 |
Law Enforcement | 2 |
Police School Relationship | 2 |
School Security | 2 |
Administrative Policy | 1 |
Administrator Attitudes | 1 |
Administrator Role | 1 |
Age | 1 |
More ▼ |
Source
Applied Cognitive Psychology | 1 |
Charles C. Thomas, Publisher,… | 1 |
Journal of Educational… | 1 |
ProQuest LLC | 1 |
US Department of Homeland… | 1 |
Author
Black, Jeffrey | 1 |
Fisher, Bonnie S., Ed. | 1 |
Fossey, Richard | 1 |
Harris, Maggie W. | 1 |
Hoff, Dianne L. | 1 |
Mitchell, Sidney N. | 1 |
Rivera Vazquez, Juan C. | 1 |
Sarno, Dawn M. | 1 |
Sloan, John J., III, Ed. | 1 |
Smith, Michael Clay | 1 |
Publication Type
Books | 2 |
Journal Articles | 2 |
Reports - Research | 2 |
Collected Works - General | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Location
Puerto Rico | 1 |
Laws, Policies, & Programs
Higher Education Act Title IX | 1 |
Student Right to Know and… | 1 |
Assessments and Surveys
Big Five Inventory | 1 |
What Works Clearinghouse Rating
Which Phish Is Captured in the Net? Understanding Phishing Susceptibility and Individual Differences
Sarno, Dawn M.; Harris, Maggie W.; Black, Jeffrey – Applied Cognitive Psychology, 2023
Phishing research presents conflicting findings regarding the psychological predictors of phishing susceptibility. The present work aimed to resolve these discrepancies by utilizing a diverse online sample and email set. Participants completed a survey that included an email classification task and measured several individual differences,…
Descriptors: Computer Security, Electronic Mail, Deception, At Risk Persons
Fisher, Bonnie S., Ed.; Sloan, John J., III, Ed. – Charles C. Thomas, Publisher, Ltd, 2022
This new edition of "Campus Crime" shares with readers the advancements that have been made in understanding campus crime. Across the three sections of the book, chapters review changes while also addressing current -- and even future -- crime and security issues confronting institutions of higher education. Some of these chapters…
Descriptors: Crime, Higher Education, Victims of Crime, Sexual Abuse
Rivera Vazquez, Juan C. – ProQuest LLC, 2012
Cyber crime is a term used to describe the abuse and misuse of a computer system where it is at a loss for someone across the world. It also refers to crimes committed by, or with computers via the Internet or only accessing a computer, is to steal or manipulate information of a company or a person and to use as a means for traditional such as…
Descriptors: Crime, Computer Security, Attitudes, Questionnaires
US Department of Homeland Security, 2011
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
Descriptors: Public Opinion, Consciousness Raising, Computer Security, Child Safety
Hoff, Dianne L.; Mitchell, Sidney N. – Journal of Educational Administration, 2009
Purpose: The purpose of this paper is to present research exploring the pervasiveness and causes of cyberbullying, the psychological impact on students, and the responses to cyberbullying from students and administrators. The goal is to give school leaders a greater understanding of this phenomenon and suggest steps to deal with this challenging…
Descriptors: Student Attitudes, Educational Policy, Bullying, Computer Security
Smith, Michael Clay; Fossey, Richard – 1995
This book discusses issues related to campus crime and offers administrators suggestions and checklists that can be used to evaluate current procedures and defuse potential problems. Chapters cover: (1) "The Campus: A Sanctuary?"; (2) "The Complexion of Campus Crime Today"; (3) "The Concept of Crime and the Shape of…
Descriptors: Computer Security, Crime Prevention, Due Process, Evidence (Legal)