NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Plachkinova, Miloslava; Vo, Ace – Journal of Cybersecurity Education, Research and Practice, 2022
The current study proposes a taxonomy to organize existing knowledge on cybercrimes against critical infrastructure such as power plants, water treatment facilities, dams, and nuclear facilities. Routine Activity Theory is used to inform a three-dimensional taxonomy with the following dimensions: hacker motivation (likely offender), cyber,…
Descriptors: Crime, Computer Security, Facilities, Nuclear Energy
Peer reviewed Peer reviewed
Direct linkDirect link
Selwyn, Neil – Studies in Higher Education, 2008
Although there is a growing interest in the victimisation of university students, the issue of student offending has been largely overlooked in the criminology and education literatures. Based on a self-report study of 1215 undergraduate students at UK higher education institutions, this article explores the level and nature of student…
Descriptors: Undergraduate Students, Higher Education, Criminals, Student Experience
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Doughty, Howard A. – College Quarterly, 2005
Both parts of the author's past--a concern with terrorism and with the education of future agents of the state who will be expected to curb, if not to eliminate, it--contribute to what he wants to say in this essay. He seeks to make six points: (1) Racial profiling is not a discrete issue but an instance of a more pervasive racism that is evident…
Descriptors: Information Systems, Law Enforcement, Foreign Countries, Educational Technology