NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zorlu, Eyup – Journal of Learning and Teaching in Digital Age, 2023
The purpose of this study is to examine the relationship between college students' cyberbullying awareness and their ability to ensure their personal cybersecurity. A total of 401 students participated in this study. The Ability to Ensure Personal Cybersecurity Scale, the Cyberbullying Awareness Scale, and a Personal Information Form developed by…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Knowledge Level
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Luse, Andy; Burkman, Jim – Journal of Cybersecurity Education, Research and Practice, 2021
Social engineering is a large problem in our modern technological world, but while conceptually understood, it is harder to teach compared to traditional pen testing techniques. This research details a class project where students implemented a phishing exercise against real-world targets. Through cooperation with an external corporate partner,…
Descriptors: Computer Security, Information Security, Deception, Student Projects
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Belshaw, Scott H.; Nodeland, Brooke; Underwood, Lorrin; Colaiuta, Alexandrea – Journal of Cybersecurity Education, Research and Practice, 2020
Increasingly, criminal justice practitioners have been called on to help solve breaches in cyber security. However, while the demand for criminal justice participation in cyber investigations increases daily, most universities are lagging in their educational and training opportunities for students entering the criminal justice fields. This…
Descriptors: Law Enforcement, Community Colleges, Computer Security, Information Security
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Nkotagu, Gabriel Hudson – Journal of International Students, 2011
Internet fraud takes a number of forms with the responsible individuals changing tactics rapidly to avoid detection. The perpetrators rely on telemarketing, emails, as well as presenting themselves personally to unsuspecting people. The evolution of internet marketing as well as ecommerce and the ease of connectivity create increasing…
Descriptors: Internet, Deception, Online Vendors, Marketing
Peer reviewed Peer reviewed
Goldsborough, Reid – Teacher Librarian, 2005
Many people still have not heard about the many ways identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. The tricksters are getting trickier. One of the newest scares involves…
Descriptors: Internet, Deception, Computer Security, Crime
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This December 10, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "The Mental-Health Crisis: What Colleges Must Do" (Kadison, Richard…
Descriptors: Eating Disorders, College Presidents, Elections, Deception