NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Small, Mario L.; Cook, Jenna M. – Sociological Methods & Research, 2023
This article examines an important and thorny problem in interview research: How to assess whether what people say motivated their actions actually did so? We ask three questions: What specific challenges are at play? How have researchers addressed them? And how should those strategies be evaluated? We argue that such research faces at least five…
Descriptors: Interviews, Qualitative Research, Barriers, Deception
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Vincent Cho; Sofia Dueñas – Journal of Educational Research and Practice, 2025
Unbeknownst to many researchers, online surveys can be vulnerable to attacks from bots and generative artificial intelligence (AI), which can generate hundreds of fraudulent responses instantly. Confronting this challenge to data integrity, we employed an adaptive approach to test the effectiveness of various anti-fraud tactics (e.g., CAPTCHA;…
Descriptors: Artificial Intelligence, Online Surveys, Research Methodology, Research Projects
Peer reviewed Peer reviewed
Direct linkDirect link
Daniels, Benjamin; Boffa, Jody; Kwan, Ada; Moyo, Sizulu – Research Ethics, 2023
Simulated standardized patients (SPs) are trained individuals who pose incognito as people seeking treatment in a health care setting. With the method's increasing use and popularity, we propose some standards to adapt the method to contextual considerations of feasibility, and we discuss current issues with the SP method and the experience of…
Descriptors: Deception, Informed Consent, Simulation, Patients
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Rea, Stephen C. – Information and Learning Sciences, 2022
Purpose: This paper aims to offer practical guidance on teaching about digital extremism -- defined here as the intersection of digital disinformation campaigns with political extremism -- by highlighting four pedagogical challenges: the danger of unintentionally "redpilling" students; the slippery slope to false equivalency and…
Descriptors: Information Technology, Antisocial Behavior, Political Attitudes, Deception
Office of Inspector General, US Department of Education, 2023
In accordance with the Reports Consolidation Act of 2000, the OIG reports annually on the most serious management and performance challenges the Department faces. For FY 2024, we identified seven management challenges for the Department: (1) Implementing pandemic relief laws for elementary and secondary education; (2) Implementing pandemic relief…
Descriptors: Federal Programs, Educational Finance, Student Financial Aid, Pandemics