Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Computer Software | 4 |
| Crime | 4 |
| Deception | 4 |
| Computer Security | 3 |
| Information Security | 3 |
| Electronic Mail | 2 |
| Training | 2 |
| Accuracy | 1 |
| Audiences | 1 |
| Cheating | 1 |
| Classification | 1 |
| More ▼ | |
Author
| Davies, Ross | 1 |
| Estes, Aaron | 1 |
| Giovanni Bryan Jamal McKinney | 1 |
| Johnson, Clare | 1 |
| Mbaziira, Alex Vincent | 1 |
| Reddy, Mike | 1 |
Publication Type
| Dissertations/Theses -… | 3 |
| Journal Articles | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Johnson, Clare; Davies, Ross; Reddy, Mike – International Journal for Educational Integrity, 2022
Academic misconduct in all its various forms is a challenge for degree-granting institutions. Whilst text-based plagiarism can be detected using tools such as Turnitin™, Plagscan™ and Urkund™ (amongst others), contract cheating and collusion can be more difficult to detect, and even harder to prove, often falling to no more than a 'balance of…
Descriptors: Student Behavior, College Students, Plagiarism, Cheating
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Estes, Aaron – ProQuest LLC, 2016
Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…
Descriptors: Risk, Electronic Mail, Computer Security, Users (Information)
Mbaziira, Alex Vincent – ProQuest LLC, 2017
Cybercriminals are increasingly using Internet-based text messaging applications to exploit their victims. Incidents of deceptive cybercrime in text-based communication are increasing and include fraud, scams, as well as favorable and unfavorable fake reviews. In this work, we use a text-based deception detection approach to train models for…
Descriptors: Crime, Information Security, Models, Networks

Peer reviewed
Direct link
