Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 2 |
| Computer Software | 2 |
| Information Sources | 2 |
| Artificial Intelligence | 1 |
| Camps | 1 |
| Computer Networks | 1 |
| Disk Drives | 1 |
| Floppy Disks | 1 |
| High School Students | 1 |
| Information Security | 1 |
| Information Technology | 1 |
| More ▼ | |
Source
| Journal of Cybersecurity… | 1 |
Publication Type
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
| Reports - Research | 1 |
Education Level
| High Schools | 1 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
He, Jonathan; Xin, ChunSheng – Journal of Cybersecurity Education, Research and Practice, 2021
Throughout the Internet, many chatbots have been deployed by various organizations to answer questions asked by customers. In recent years, we have been running cybersecurity summer camps for youth. Due to COVID-19, our in-person camp has been changed to virtual camps. As a result, we decided to develop a chatbot to reduce the number of emails,…
Descriptors: Information Security, Computer Security, Computer Software, Summer Programs
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives

Peer reviewed
