Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Computer Software | 2 |
| Law Enforcement | 2 |
| Business | 1 |
| Case Studies | 1 |
| Class Activities | 1 |
| College Students | 1 |
| Computer Science Education | 1 |
| Confidentiality | 1 |
| Crime Prevention | 1 |
| Educational Strategies | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement

Peer reviewed
Direct link
