Publication Date
| In 2026 | 1 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| College Students | 3 |
| Computer Security | 3 |
| Integrity | 3 |
| Internet | 2 |
| Safety | 2 |
| Cheating | 1 |
| College Faculty | 1 |
| Computer Assisted Testing | 1 |
| Computer Attitudes | 1 |
| Computer Networks | 1 |
| Confidentiality | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alireza Maleki; Sedigheh Karimpour – Journal of Academic Ethics, 2026
The shift to online platforms has heightened concerns about academic misconduct, particularly contract cheating, where students outsource work to third parties. While research has examined perceptions of this issue, less attention has been given to concrete teacher-led strategies, especially within English as a Foreign Language (EFL) contexts.…
Descriptors: Language Teachers, Cheating, Computer Assisted Testing, English (Second Language)
Hebah Alquran – ProQuest LLC, 2023
The rapid growth of electronic learning (e-learning) platforms has raised concerns about cybersecurity risks. The vulnerability of university students to cyberattacks and privacy concerns within e-learning platforms presents a pressing issue. Students' frequent and intense internet presence, coupled with their extensive computer usage, puts them…
Descriptors: Electronic Learning, Computer Security, Internet, Safety
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments

Peer reviewed
Direct link
