Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Electronic Mail | 5 |
Privacy | 5 |
Computer Mediated… | 2 |
Computer Security | 2 |
Computer Software | 2 |
Information Technology | 2 |
Program Effectiveness | 2 |
Social Networks | 2 |
Surveys | 2 |
Adults | 1 |
Age Differences | 1 |
More ▼ |
Source
ProQuest LLC | 5 |
Publication Type
Dissertations/Theses -… | 5 |
Education Level
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Quinn, Kelly Ann – ProQuest LLC, 2012
Research on internet communication technologies by midlife and older adults has received less attention than the young, yet rapid gains in the use internet media suggest older adults have become significant users. Adoption of specific applications has emerged in patterns distinct from younger users, reflecting the different experiences and…
Descriptors: Information Technology, Internet, Older Adults, Adults
Adebiaye, Richmond – ProQuest LLC, 2010
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and…
Descriptors: Computer Mediated Communication, Electronic Mail, Privacy, Social Networks
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Quinn-Lee, Lisa – ProQuest LLC, 2009
A review of the literature reveals few articles that deal with social work with grieving children in the public school setting. The purpose of this research is to describe and analyze the services that school social workers provide to grieving children. Grieving children are defined as those who have experienced loss through death of someone…
Descriptors: Siblings, Parents, Grandparents, Friendship