Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Crime | 3 |
Data Collection | 3 |
College Faculty | 2 |
College Students | 2 |
Electronic Mail | 2 |
Information Security | 2 |
College Instruction | 1 |
Computer Software | 1 |
Computers | 1 |
Data Analysis | 1 |
More ▼ |
Author
Brooks, Rochelle | 1 |
Casagrande, Marco | 1 |
Conti, Mauro | 1 |
Fedeli, Monica | 1 |
Losiouk, Eleonora | 1 |
McFadden, Matthew | 1 |
Publication Type
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Italy | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
McFadden, Matthew – ProQuest LLC, 2013
Cyber incident response is an emphasized subject area in cybersecurity in information technology with increased need for the protection of data. Due to ongoing threats, cybersecurity imposes many challenges and requires new investigative response techniques. In this study a Linux Incident Response Framework is designed for collecting volatile data…
Descriptors: Data Analysis, Computer Security, Crime, Models
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security