Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 8 |
Electronic Mail | 8 |
Telecommunications | 8 |
Information Security | 3 |
Internet | 3 |
College Students | 2 |
Computer Networks | 2 |
Computers | 2 |
Crime | 2 |
Educational Technology | 2 |
Feedback (Response) | 2 |
More ▼ |
Source
Africa Education Review | 1 |
Association of Small Computer… | 1 |
Campus Technology | 1 |
Computers in Libraries | 1 |
Contemporary Issues in… | 1 |
Journal of Broadcasting &… | 1 |
Journal of Cybersecurity… | 1 |
ProQuest LLC | 1 |
Author
Brooks, Rochelle | 1 |
Cole, Timothy W. | 1 |
Kritzinger, Elmarie | 1 |
Kumar, Ajoy | 1 |
Laurel Lynn Schneider | 1 |
Levy, Yair | 1 |
Li, Wei | 1 |
Pollock, Tommy | 1 |
Samoriski, Jan H. | 1 |
Schaffhauser, Dian | 1 |
Smith, Carol L., Ed. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 3 |
High Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Indiana | 1 |
Montana | 1 |
South Africa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Pollock, Tommy; Levy, Yair; Li, Wei; Kumar, Ajoy – Journal of Cybersecurity Education, Research and Practice, 2022
Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. Thus, the main goal of this research…
Descriptors: Decision Making, Information Security, Specialists, Users (Information)
Kritzinger, Elmarie – Africa Education Review, 2017
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
Descriptors: School Culture, Foreign Countries, Computer Security, Safety
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security

Samoriski, Jan H.; And Others – Journal of Broadcasting & Electronic Media, 1996
Attempts to clarify the status of e-mail privacy under the Electronic Communications Privacy Act of 1986 (ECPA). Examines current law and the paucity of definitive case law. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e-mail,…
Descriptors: Computer Security, Electronic Mail, Information Policy, Laws
Cole, Timothy W. – Computers in Libraries, 1995
Describes installation and configuration of Mosaic and a World Wide Web (WWW) site at Grainger Library. Challenges include choosing a WINSOCK; customizing Mosaic for public-access computers; reducing security risks; maximizing Multipurpose Internet Mail Extensions (MIME); designing a home page; producing Hypertext Markup Language (HTML) documents.…
Descriptors: Academic Libraries, Computer Networks, Computer Security, Computer Software Development
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2005
This 2005 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Campus Technology: Anticipating the Future." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document include: (1) Developing…
Descriptors: Virtual Classrooms, Programming (Broadcast), Computers, Tests