Publication Date
In 2025 | 1 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Crime Prevention | 6 |
Foreign Countries | 6 |
Information Technology | 3 |
Computer Software | 2 |
Crime | 2 |
Criminals | 2 |
Information Security | 2 |
Internet | 2 |
Academic Achievement | 1 |
Access to Information | 1 |
More ▼ |
Source
Education and Information… | 1 |
IEEE Transactions on Education | 1 |
Journal of Cybersecurity… | 1 |
Journal of Psychologists and… | 1 |
ProQuest LLC | 1 |
Research Ethics | 1 |
Author
Abu Alam | 1 |
Akuta, Eric Agwe-Mbarika | 1 |
Alex Cameron | 1 |
Amosun, Peter Adewale | 1 |
Choo, Kim-Kwang Raymond | 1 |
Ige, Olugbenga Adedayo | 1 |
Jordan Allison | 1 |
Kabadayi, Fedai | 1 |
Madhu Khurana | 1 |
Mari-Liisa Parder | 1 |
Marten Juurik | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 4 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mari-Liisa Parder; Pieter Gryffroy; Marten Juurik – Research Ethics, 2024
The growing importance of researching online activities, such as cyber-deviance and cyber-crime, as well as the use of online tools (e.g. questionnaires, games, and other interactive tools) has created new ethical and legal challenges for researchers, which can be even more complicated when researching adolescents. In this article, we highlight…
Descriptors: Foreign Countries, Crime Prevention, Ethics, Computer Security
Alex Cameron; Abu Alam; Madhu Khurana; Jordan Allison; Nasreen Anjum – IEEE Transactions on Education, 2025
Modern day organizations face a continuous challenge in ensuring that their employees are cognizant with malware and cyber attacks, since it has the potential to cause financial, legal, and reputational damage to them. Current awareness training exists in a multitude of forms to equip employees and organizations to protect themselves against…
Descriptors: Computer Security, Crime Prevention, Information Security, Gamification
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Kabadayi, Fedai; Sari, Serkan V. – Journal of Psychologists and Counsellors in Schools, 2018
This study examined the role of resilience in the lives of cyberbullying perpetrators and their victims. Turkish adolescents (n = 444; 245 girls, 55.2%, and 199 boys, 44.8%) 15-19 years of age (mean age of 16.58 years, SD = 0.789) were recruited from different high schools. The participants completed the Cyberbullying Scale (Aricak, Kinay, &…
Descriptors: Resilience (Psychology), Bullying, Computer Security, Victims
Amosun, Peter Adewale; Ige, Olugbenga Adedayo; Choo, Kim-Kwang Raymond – Education and Information Technologies, 2015
Nigeria is considered by many to be a cyber crime hot spot, and is often ranked among the world's top cyber crime committing countries (e.g. advanced fee fraud is also known as Nigerian scams and 419 scams--419 is a section under the Nigerian Criminal Code Act that prohibits obtaining goods by false pretences). We designed a cyber crime prevention…
Descriptors: Foreign Countries, Crime, Computer Security, Crime Prevention
Akuta, Eric Agwe-Mbarika – ProQuest LLC, 2012
The past decade has projected much of Africa as a haven for cybercrime perpetration. This view was widely evidenced in Cameroon, a country regarded as a miniature Africa due to its diverse socio-cultural, economic and political characteristics. In spite of efforts by government to curb cybercrime, the perpetration rate has not declined due to a…
Descriptors: Foreign Countries, Computer Security, Internet, Criminals