NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Casagrande, Marco; Conti, Mauro; Fedeli, Monica; Losiouk, Eleonora – Journal of Cybersecurity Education, Research and Practice, 2023
Phishing is a common social engineering attack aimed to steal personal information. Universities attract phishing attacks because: (1) they store employees and students sensitive data; (2) they save confidential documents; and (3) their infrastructures often lack security. In this paper, we showcase a phishing assessment at the University of…
Descriptors: Fraternities, Computer Security, Information Security, Higher Education
Office of Inspector General, US Department of Education, 2023
In accordance with the Reports Consolidation Act of 2000, the OIG reports annually on the most serious management and performance challenges the Department faces. For FY 2024, we identified seven management challenges for the Department: (1) Implementing pandemic relief laws for elementary and secondary education; (2) Implementing pandemic relief…
Descriptors: Federal Programs, Educational Finance, Student Financial Aid, Pandemics
Office of Inspector General, US Department of Education, 2021
The Government Performance and Results Modernization Act of 2010 defines major management challenges as programs or management functions that are vulnerable to waste, fraud, abuse, and mismanagement, and where a failure to perform well could seriously affect the ability of the U.S. Department of Education (Department) to achieve its mission or…
Descriptors: Audits (Verification), Inspection, COVID-19, Pandemics
Office of Inspector General, US Department of Education, 2020
In accordance with the Reports Consolidation Act of 2000, the Office of Inspector General (OIG) reports annually on the most serious management and performance challenges the Department faces. OIG's reports include a brief assessment of the Department's progress in addressing the challenges. They also identify further actions that, if properly…
Descriptors: Federal Programs, Educational Finance, Information Security, Audits (Verification)
Data Quality Campaign, 2011
As state policymakers implement statewide longitudinal data systems that collect, store, link and share student-level data, it is critical that they understand applicable privacy and data security standards and laws designed to ensure the privacy, security, and confidentiality of that data. To help state policymakers navigate this complex legal…
Descriptors: State Policy, Data Collection, Databases, Student Records
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Gray, Dahli – American Journal of Business Education, 2008
Forensic versus traditional accounting and auditing are compared and contrasted. Evidence gathering is detailed. Forensic science and fraud symptoms are explained. Criminalists, expert testimony and corporate governance are presented.
Descriptors: Accounting, Audits (Verification), Comparative Analysis, Correlation