Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Crime | 5 |
Electronic Mail | 5 |
College Students | 4 |
Information Security | 4 |
College Faculty | 3 |
Computer Security | 3 |
Computers | 2 |
Data Collection | 2 |
Deception | 2 |
Foreign Countries | 2 |
Higher Education | 2 |
More ▼ |
Source
British Journal of… | 1 |
Community College Journal | 1 |
Contemporary Issues in… | 1 |
Information Systems Education… | 1 |
Journal of Cybersecurity… | 1 |
Author
Bartram, Brendan | 1 |
Brooks, Rochelle | 1 |
Casagrande, Marco | 1 |
Conti, Mauro | 1 |
Courte, Jill | 1 |
Fedeli, Monica | 1 |
Finkel, Ed | 1 |
Losiouk, Eleonora | 1 |
Werner, Laurie A. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Research | 3 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 5 |
Two Year Colleges | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Bartram, Brendan – British Journal of Educational Studies, 2015
This article offers a critical examination of students' emotional bargaining in higher education. Based on an analysis of student emails and staff interviews, the article uses a case-study approach to explore the nature of this behaviour and the motivational drivers behind it. The paper reveals an amalgam of socio-cultural and educational factors,…
Descriptors: College Students, Emotional Response, Higher Education, Electronic Mail
Werner, Laurie A.; Courte, Jill – Information Systems Education Journal, 2010
Despite advances in spam detection software, anti-spam laws, and increasingly sophisticated users, the number of successful phishing scams continues to grow. In addition to monetary losses attributable to phishing, there is also a loss of confidence that stifles use of online services. Using in-class activities in an introductory computer course…
Descriptors: Information Security, Crime, Prevention, Class Activities
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security