Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 2 |
Computer Software | 2 |
Foreign Countries | 2 |
Access to Information | 1 |
Censorship | 1 |
College Role | 1 |
Conflict | 1 |
Crime | 1 |
Crime Prevention | 1 |
Criminals | 1 |
Economic Factors | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Iran | 2 |
Ukraine | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Kean, Sam – Chronicle of Higher Education, 2007
In this article, the author discusses a computer program called Psiphon which bypasses government filters undetected. The University of Toronto's Citizen Lab, a research center for digital media and politics, designed Psiphon for technology-savvy activists. Some technology-savvy activists use other open-source software, like Tor (which relies on…
Descriptors: Foreign Countries, Information Technology, Computer Software, Social Networks