NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Kolowich, Steve – Chronicle of Higher Education, 2009
Few academic debates are as contentious as those surrounding the Dead Sea Scrolls. These fragments of some 800 ancient documents include portions of all but one book of the Hebrew Bible. The first ones were discovered in 1947 by shepherds in caves on the northwestern shore of the Dead Sea, and are believed to be the oldest surviving Judaic…
Descriptors: Middle Eastern History, Web Sites, Jews, Electronic Publishing
Peer reviewed Peer reviewed
Goldsborough, Reid – Teacher Librarian, 2005
Many people still have not heard about the many ways identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. The tricksters are getting trickier. One of the newest scares involves…
Descriptors: Internet, Deception, Computer Security, Crime