Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 5 |
Descriptor
Crime | 5 |
Electronic Mail | 5 |
Information Security | 5 |
Deception | 4 |
Computer Security | 3 |
Data Collection | 2 |
Employees | 2 |
Behavior Patterns | 1 |
Business Communication | 1 |
Cognitive Ability | 1 |
College Faculty | 1 |
More ▼ |
Author
Casagrande, Marco | 1 |
Conti, Mauro | 1 |
Fedeli, Monica | 1 |
Giovanni Bryan Jamal McKinney | 1 |
Jackie Christopher Scott | 1 |
John Jerrim | 1 |
Laurel Lynn Schneider | 1 |
Losiouk, Eleonora | 1 |
Publication Type
Dissertations/Theses -… | 3 |
Journal Articles | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Italy | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
John Jerrim – British Journal of Educational Studies, 2023
Young people are facing an ever-increasing array of online dangers. One of the most common is receipt of a phishing email. This paper presents new evidence on the characteristics of young people most likely to respond to such emails. I find approximately one-in-seven 15-year-olds are at risk of responding to a phishing email, rising to one-in-five…
Descriptors: Information Security, Electronic Mail, Crime, Data Collection
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level