Publication Date
In 2025 | 0 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 10 |
Descriptor
Computer Security | 10 |
Telecommunications | 10 |
Information Security | 7 |
Handheld Devices | 6 |
College Students | 3 |
Foreign Countries | 3 |
Identification | 3 |
Knowledge Level | 3 |
Technological Literacy | 3 |
Computer Networks | 2 |
Crime | 2 |
More ▼ |
Source
Journal of Cybersecurity… | 3 |
ProQuest LLC | 2 |
Asian Journal of Distance… | 1 |
Education and Information… | 1 |
International Association for… | 1 |
International Journal of… | 1 |
Pakistan Journal of Distance… | 1 |
Author
Harry May | 2 |
Travis Atkison | 2 |
Ankur Chattopadhyay | 1 |
Chin, Amita | 1 |
Frank Ciccitto | 1 |
Inmaculada Arnedillo Sánchez,… | 1 |
Jamal, Bakht | 1 |
Jones, Beth | 1 |
Kaikho Ashuni | 1 |
Kumar, Ajoy | 1 |
Laurel Lynn Schneider | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 7 |
Dissertations/Theses -… | 2 |
Books | 1 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Junior High Schools | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
Audience
Location
Brazil | 1 |
Estonia | 1 |
European Union | 1 |
Greece | 1 |
India | 1 |
Indonesia | 1 |
Italy | 1 |
Mexico | 1 |
Pakistan | 1 |
Philippines | 1 |
Portugal | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
This paper presents a novel approach for mitigating wormhole attacks on wireless networks using propagation delay timing. The wormhole attack is a persistent security threat that threatens the integrity of network communications, potentially leading to data theft or other malicious activities. While various methods exist for combating wormhole…
Descriptors: Telecommunications, Computer Networks, Computer Security, Simulation
Harry May; Travis Atkison – Journal of Cybersecurity Education, Research and Practice, 2024
Detecting and mitigating wormhole attacks in wireless networks remains a critical challenge due to their deceptive nature and potential to compromise network integrity. This paper proposes a novel approach to wormhole detection by leveraging propagation delay analysis between network nodes. Unlike traditional methods that rely on signature-based…
Descriptors: Computer Security, Identification, Computer Networks, Telecommunications
Tyler Poe; Ankur Chattopadhyay – Education and Information Technologies, 2024
Existing research literature in computing and IT education shows that there has been limited work on investigating how offense based learning approaches using hacks can enhance learning of mobile security topics. In an effort to fill this research gap, we performed an experimental study with a unique, nifty user hack driven offense based learning…
Descriptors: Information Security, Computer Security, Telecommunications, Handheld Devices
Jamal, Bakht; Rizvi, Syed Asad Abbas – Pakistan Journal of Distance and Online Learning, 2023
This paper intended to analyze the practices of digital citizenship among university student in Pakistan. The quantitative descriptive survey research design was adopted for this study. The population of the study was 800 students of BS (Education) program in ten public sector universities in Punjab, Pakistan. Simple random sampling technique was…
Descriptors: Foreign Countries, Technological Literacy, College Students, Computer Use
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Chin, Amita; Jones, Beth; Little, Philip – International Journal of Education and Development using Information and Communication Technology, 2021
This study on smartphone security behaviors and practices is a continuation of the work in Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive university were compared to results from a 2014 survey at the same institution. That study found that students continued to be lax in their mobile security practices.…
Descriptors: Telecommunications, Handheld Devices, Computer Security, Student Attitudes
Pollock, Tommy; Levy, Yair; Li, Wei; Kumar, Ajoy – Journal of Cybersecurity Education, Research and Practice, 2022
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research…
Descriptors: Decision Making, Information Security, Specialists, Users (Information)
Kaikho Ashuni – Asian Journal of Distance Education, 2024
The digital age has opened up new and exciting opportunities for Open and Distance Learning (ODL) in universities. But, is going digital reinforcing the existing social inequalities? This qualitative research examines the three levels of digital divide and digital inequality among learners at India's National Open University, IGNOU. The findings…
Descriptors: Distance Education, Open Education, Open Universities, Social Justice
Piet Kommers, Editor; Inmaculada Arnedillo Sánchez, Editor; Pedro Isaías, Editor – International Association for Development of the Information Society, 2024
These proceedings contain the papers and posters of the 22nd International Conference on e-Society (ES 2024) and 20th International Conference on Mobile Learning (ML 2024), organised by the International Association for Development of the Information Society (IADIS) in Porto, Portugal, during March 9-11, 2024. The e-Society 2024 conference aims to…
Descriptors: Information Technology, Adolescents, Divorce, Health Services