NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 96 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Schoen, Edward J.; Hughes, Diane Y.; Kowalsky, Michelle A. – Journal of Legal Studies Education, 2017
There are two overarching goals to this case study. First, the authors want to introduce students as early as possible in their study of business to the perils of deliberate misstatements of income in financial statement and the significant consequences that await those who do. Given the recent business scandals involving mortgage-backed…
Descriptors: Case Studies, Court Litigation, Accounting, Corporations
Peer reviewed Peer reviewed
Direct linkDirect link
Ali, Mazurina Mohd; Zaharon, Nur Farhana Mohd – International Journal of Educational Reform, 2024
Internet users are becoming ignorant with their data and the transparency of information due to the nature of high-speed internet today. Regrettably, internet users are deceived by engineering tactics performed by highly trained people, namely cybercriminals. Thus, in order to combat phishing attacks, internet users should be educated on security…
Descriptors: Information Security, Governance, Data, Literature Reviews
Peer reviewed Peer reviewed
Katz, James E. – Society, 1997
Explores the social issues, including manners, security, crime (fraud), and social control associated with information networking, with emphasis on the Internet. Also addresses the influence of cellular phones, the Internet and other information technologies on society. (GR)
Descriptors: Information Networks, Information Technology, Internet, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bright Siaw Afriyie; Samuel Sambasivam – Information Systems Education Journal, 2023
Nearly half the adult population in developing nations lacks a formal bank account and other financial services. Ghana is no exception, having a massive community of unbanked adults and among those countries positioned at the bottom of the spectrum of financial inclusion. The advent of mobile financial services (MFS) claims an alternative mode to…
Descriptors: Computer Security, Information Security, Prevention, Deception
Spellman, Robert L. – 1986
Although noting that the Securities and Exchange Commission (SEC) has been a valuable ally of journalists, this paper suggests that recent efforts of the SEC in prosecuting the case of R. Foster Winans, Jr., a former writer for the "Wall Street Journal," may be unconstitutional. Following an introduction to the First Amendment issues…
Descriptors: Confidentiality, Conflict of Interest, Constitutional Law, Court Litigation
James Johnston – ProQuest LLC, 2024
The need in the public sector is to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction, as this group is targeted more than others for technology fraud. The practice-focused question centers around which topics need to be part of technology fraud pilot training to reduce the…
Descriptors: Older Adults, Learning Theories, Information Security, Pilot Projects
Edo, Galaxy Samson – ProQuest LLC, 2012
Electronic-authentication methods, no matter how sophisticated they are in preventing fraud, must be able to identify people to a reasonable degree of certainty before any credentials are assured (Personix, 2006). User authentication is different from identity verification, and both are separate but vital steps in the process of securing…
Descriptors: Human Body, Technological Advancement, Information Technology, Identification
Shea, Rebecca; Gambler, Rebecca – US Government Accountability Office, 2019
As of March 2018, more than 1.2 million foreign students in the United States were enrolled in 8,774 schools certified by the Student and Exchange Visitor Program (SEVP). The U.S. Immigration and Customs Enforcement (ICE) is responsible for managing SEVP, which certifies schools to enroll foreign students. Various ICE offices have a role in…
Descriptors: Deception, Student Exchange Programs, Foreign Students, Public Agencies
Peer reviewed Peer reviewed
Direct linkDirect link
Hunt, Stephen K.; Meyer, Kevin R. – Communication Education, 2021
America is deeply divided over issues like election fraud, COVID-19, and systematic racism. More concerning, Jenkins (2021) argues that the next few years could be marred by "death threats, attempted assassinations of political leaders, and other acts of terrorism" (para. 11). In addition, a U.S. Department of Homeland Security (DHS)…
Descriptors: Teaching Methods, Citizen Participation, Terrorism, Racial Discrimination
Peer reviewed Peer reviewed
Direct linkDirect link
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Man, Kaiwen; Harring, Jeffrey R.; Sinharay, Sandip – Journal of Educational Measurement, 2019
Data mining methods have drawn considerable attention across diverse scientific fields. However, few applications could be found in the areas of psychological and educational measurement, and particularly pertinent to this article, in test security research. In this study, various data mining methods for detecting cheating behaviors on large-scale…
Descriptors: Information Retrieval, Data Analysis, Identification, Tests
Norma Torres-Hernández; María-Jesús Gallego-Arrufat; María del Mar García-Ruiz – Digital Education Review, 2023
Online risks are a concern for citizens in the digital society. Many sectors of the population lack training to face, prevent and solve problematic situations arising from Internet use. University researchers and innovation agents in small towns in southern Spain are carrying out an educational programme of 13 intergenerational workshops to…
Descriptors: Intergenerational Programs, Digital Literacy, Internet, Open Education
Kim, Jungsun – ProQuest LLC, 2009
Hoteliers have installed new technology, such as self-service and wireless technology, to improve customer service or to increase revenue. However, it seems that they tend to either be unaware of or ignore potential vulnerability of their systems when they add more technologies. The underestimated risks can possibly result in massive losses for…
Descriptors: Hospitality Occupations, Intention, Risk, Program Effectiveness
Peer reviewed Peer reviewed
Direct linkDirect link
Okada, Alexandra; Noguera, Ingrid; Alexieva, Lyubka; Rozeva, Anna; Kocdar, Serpil; Brouns, Francis; Ladonlahti, Tarja; Whitelock, Denise; Guerrero-Roldán, Ana-Elena – British Journal of Educational Technology, 2019
Checking the identity of students and authorship of their online submissions is a major concern in Higher Education due to the increasing amount of plagiarism and cheating using the Internet. The literature on the effects of e-authentication systems for teaching staff is very limited because it is a novel procedure for them. A considerable gap is…
Descriptors: Audits (Verification), Plagiarism, Cheating, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Love, Terence; Cooper, Trudi – Journal of Information Technology Education, 2004
This paper outlines the main findings of research about online portfolio information systems. This research focused on the educational integrity of these educational systems and the maximisation of value across all stakeholders, in particular the value gained from the automation and interaction potential of the online environment. The findings and…
Descriptors: Portfolio Assessment, Integrity, Information Systems, Teaching Methods
Previous Page | Next Page »
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7