Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 4 |
| Since 2007 (last 20 years) | 6 |
Descriptor
| Computer Security | 6 |
| Correlation | 6 |
| Crime | 6 |
| Information Security | 6 |
| Risk | 3 |
| Training | 3 |
| Computer Software | 2 |
| Deception | 2 |
| Disclosure | 2 |
| Electronic Mail | 2 |
| Information Systems | 2 |
| More ▼ | |
Author
| Brewer, Neil | 1 |
| Brown, Brandon R. | 1 |
| Estes, Aaron | 1 |
| Jonathan Keirre Adams | 1 |
| Laurel Lynn Schneider | 1 |
| Lim, Alliyza | 1 |
| White, Jautau Kelton | 1 |
| Young, Robyn L. | 1 |
Publication Type
| Dissertations/Theses -… | 5 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Kindergarten | 1 |
Audience
Location
| California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jonathan Keirre Adams – ProQuest LLC, 2023
The human component of information systems represents a critical and high-impact target for cyberattacks. Firms address these threats through various means, including security awareness training, security policy monitoring, security controls, and enforcement. Even the most robust technical controls have limits. Consequently, elevating user…
Descriptors: Computer Security, Information Security, Intention, Information Systems
Lim, Alliyza; Brewer, Neil; Young, Robyn L. – Journal of Autism and Developmental Disorders, 2023
Reports of cybercrime being committed by people on the autism spectrum often imply that autism may be more prevalent among cybercriminals than the general population, although this remains unproven. In an online survey of 302 participants, we found that autistic individuals (n = 25) were more likely to report engagement in cybercrime than…
Descriptors: Crime, Internet, Information Security, Autism Spectrum Disorders
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks

Direct link
Peer reviewed
