Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 10 |
Since 2016 (last 10 years) | 14 |
Since 2006 (last 20 years) | 22 |
Descriptor
Computer Security | 22 |
Crime | 22 |
Foreign Countries | 22 |
Internet | 9 |
Information Security | 8 |
Computer Mediated… | 5 |
Ethics | 5 |
Higher Education | 5 |
Social Media | 5 |
Educational Technology | 4 |
Information Technology | 4 |
More ▼ |
Source
Author
Publication Type
Journal Articles | 15 |
Reports - Research | 11 |
Reports - Descriptive | 4 |
Dissertations/Theses -… | 3 |
Collected Works - Proceedings | 2 |
Books | 1 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Audience
Location
United Kingdom | 3 |
Australia | 2 |
Brazil | 2 |
Cameroon | 2 |
Ghana | 2 |
India | 2 |
Indonesia | 2 |
Italy | 2 |
Malaysia | 2 |
Mexico | 2 |
New Zealand | 2 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
T., Santhosh; K., Thiyagu – Journal of Educational Technology, 2022
Cyberspace-related risks have increased massively due to the absence of awareness and self-resistance among Internet users to safeguard themselves. One of the vital measures to cultivate knowledge and understanding is the holistic intervention of cyber safety and security programs. Creating awareness through cyber safety and security initiatives…
Descriptors: Computer Security, Safety, Information Security, Crime
Valdes, Edgar – ProQuest LLC, 2022
The aim of this study is to understand the Tor browser and its multiple applications as related to cybersecurity. The study also argues that most internet users are not aware of the danger they face when navigating the dark web. This research explores top executives' and specialized employees' awareness and understating of the hidden areas of…
Descriptors: Foreign Countries, Computer Security, Internet, Crime
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Bernard Ngalim – Journal of Cybersecurity Education, Research and Practice, 2024
This paper reviews cybersecurity laws and regulations in Cameroon, focusing on cybersecurity and information security audits and risk assessments. The importance of cybersecurity risk assessment and the implementation of security controls to cure deficiencies noted during risk assessments or audits is a critical step in developing cybersecurity…
Descriptors: Laws, Audits (Verification), Risk, Risk Assessment
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Chapman, John – Higher Education Policy Institute, 2019
Higher education regularly experiences cyber attacks. Organisations that do not adequately protect themselves risk the loss or exposure of personal student and staff data and also commercial, institutional and research data that are valuable to cyber criminals operating domestically and internationally. This paper discusses: (1) the current…
Descriptors: Higher Education, Internet, Information Security, Computer Security
Brar, Raj – BU Journal of Graduate Studies in Education, 2022
Social media is an important part of all of our lives. However, there is no requirement for students in Manitoba to receive formalized education in regards to social media and its usage in the K-12 Canadian curriculum instruction. Such formalized education is extremely important for adolescents to understand the multiple facets of social media…
Descriptors: Social Media, Educational Technology, Adolescents, Foreign Countries
Alsager, Haroon Nasser – Arab World English Journal, 2020
Numerous studies have been concerned with developing new authorship recognition systems to address the increasing rates of cybercrimes associated with the anonymous nature of social media platforms, which still offer the opportunity for the users not to reveal their true identities. Nevertheless, it is still challenging to identify the real…
Descriptors: Social Media, Semitic Languages, Authors, Computer Security
Almuhaideb, Abdullah M.; Saeed, Saqib – Journal of Information Systems Education, 2021
ABET accreditation has become a well-known standard for academic programs not only in the U.S. but also across the globe. Instantiating the processes to systematically improve the quality of programs is a daunting task for higher education institutions. In this contribution, we provide a detailed process-based framework that can assist aspiring…
Descriptors: Engineering Education, Accreditation (Institutions), Computer Security, Crime
Alleyne, Philmore; Soleyn, Sherlexis; Harris, Terry – Journal of Academic Ethics, 2015
The purpose of this study is to investigate the salient factors that influence accounting students to engage in software and music piracy. This study uses the theory of reasoned action (TRA) and the theory of planned behavior (TPB), and extends these models to incorporate other variables (such as moral obligation and perceived prosecution risk) to…
Descriptors: Predictor Variables, College Students, Accounting, Intention
Kansu, Ceren Çevik; Öksüz, Yücel – Journal of Education and Training Studies, 2019
This study was aimed to determine of their perceptions and levels of digital citizenship for pre-service classroom teachers. The study was conducted with 76 senior pre-service classroom teachers at Education Faculty of B. U. The study is survey research. In this research, "The Digital Citizenship Scale" developed by Kocadag (2012) was…
Descriptors: Preservice Teachers, Student Attitudes, Technological Literacy, Information Technology
Sun, Jerry Chih-Yuan; Kuo, Cian-Yu; Hou, Huei-Tse; Lin, Yu-Yan – Educational Technology & Society, 2017
The purposes of this study were to provide a game-based anti-phishing lesson to 110 elementary school students in Taiwan, explore their learning behavioral patterns, and investigate the effects of the flow states on their learning behavioral patterns and learning achievement. The study recorded behaviour logs, and applied a pre- and post-test on…
Descriptors: Educational Games, Electronic Learning, Educational Technology, Elementary School Students
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond – Education and Information Technologies, 2015
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Descriptors: Foreign Countries, Crime, Computer Security, Crime Prevention
Previous Page | Next Page »
Pages: 1 | 2