Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Crime | 3 |
Electronic Mail | 3 |
Internet | 3 |
Computer Security | 2 |
Deception | 2 |
Behavior Patterns | 1 |
Computer Mediated… | 1 |
Correlation | 1 |
Disclosure | 1 |
Discussion Groups | 1 |
Electronic Publishing | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Kolowich, Steve – Chronicle of Higher Education, 2009
Few academic debates are as contentious as those surrounding the Dead Sea Scrolls. These fragments of some 800 ancient documents include portions of all but one book of the Hebrew Bible. The first ones were discovered in 1947 by shepherds in caves on the northwestern shore of the Dead Sea, and are believed to be the oldest surviving Judaic…
Descriptors: Middle Eastern History, Web Sites, Jews, Electronic Publishing

Goldsborough, Reid – Teacher Librarian, 2005
Many people still have not heard about the many ways identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. The tricksters are getting trickier. One of the newest scares involves…
Descriptors: Internet, Deception, Computer Security, Crime