{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T10:15:14Z","timestamp":1764584114114,"version":"3.46.0"},"reference-count":50,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T00:00:00Z","timestamp":1764288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>Generative Artificial Intelligence (GenAI) has transformed Australian higher education, amplifying online harms such as misinformation, fraud, and image-based abuse, with significant implications for cybercrime prevention. Combining a PRISMA-guided systematic review with MAXQDA-driven analysis of Australian university policies, this research evaluates institutional strategies against national frameworks, such as the Cybersecurity Strategy 2023\u20132030. Analyzing data from academic literature, we identify three key themes: educational strategies, alignment with national frameworks, and policy gaps and development. As the first qualitative analysis of 40 Australian university policies, this study uncovers systemic fragmentation in governance frameworks, with only 12 institutions addressing data privacy risks and none directly targeting AI-driven disinformation threats like deepfake harassment\u2014a critical gap in global AI governance literature. This study provides actionable recommendations to develop the National GenAI Governance Framework, co-developed by TEQSA\/UA and DoE, enhanced cyberbullying policies, and behavior-focused training to enhance digital safety and prevent cybercrime in Australian higher education. Mandatory annual CyberAI Literacy Module for all students and staff to ensure awareness of cybersecurity risks, responsible use of artificial intelligence, and digital safety practices within the university community.<\/jats:p>","DOI":"10.3390\/informatics12040132","type":"journal-article","created":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T09:34:37Z","timestamp":1764581677000},"page":"132","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Reducing AI-Generated Misinformation in Australian Higher Education: A Qualitative Analysis of Institutional Responses to AI-Generated Misinformation and Implications for Cybercrime Prevention"],"prefix":"10.3390","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3684-5403","authenticated-orcid":false,"given":"Leo S. F.","family":"Lin","sequence":"first","affiliation":[{"name":"Australian Graduate School of Policing and Security, Charles Sturt University, 10-12 Brisbane Ave, Barton, Canberra, ACT 2600, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7672-3609","authenticated-orcid":false,"given":"Geberew Tulu","family":"Mekonnen","sequence":"additional","affiliation":[{"name":"Centre for Law and Justice, Charles Sturt University, 10-12 Brisbane Ave, Barton, Canberra, ACT 2600, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1455-2992","authenticated-orcid":false,"given":"Mladen","family":"Zecevic","sequence":"additional","affiliation":[{"name":"School of Policing Studies, Charles Sturt University, McDermott Drive, Goulburn, NSW 2580, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1650-701X","authenticated-orcid":false,"given":"Immaculate","family":"Motsi-Omoijiade","sequence":"additional","affiliation":[{"name":"Artificial Intelligence and Cyber Futures Institute, Charles Sturt University, Panorama Ave, Bathurst, NSW 2795, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1540-7180","authenticated-orcid":false,"given":"Duane","family":"Aslett","sequence":"additional","affiliation":[{"name":"Centre for Law and Justice, Charles Sturt University, 10-12 Brisbane Ave, Barton, Canberra, ACT 2600, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0616-5546","authenticated-orcid":false,"given":"Douglas M. C.","family":"Allan","sequence":"additional","affiliation":[{"name":"Australian Graduate School of Policing and Security, Charles Sturt University, 10-12 Brisbane Ave, Barton, Canberra, ACT 2600, Australia"}]}],"member":"1968","published-online":{"date-parts":[[2025,11,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.60084\/jeml.v2i2.233","article-title":"Embrace, Don\u2019t Avoid: Reimagining Higher Education with Generative Artificial Intelligence","volume":"2","author":"Noviandy","year":"2024","journal-title":"J. Educ. Manag. Learn."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Bahroun, Z., Anane, C., Ahmed, V., and Zacca, A. (2023). Transforming education: A comprehensive review of generative artificial intelligence in educational settings through bibliometric and content analysis. Sustainability, 15.","DOI":"10.3390\/su151712983"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"35","DOI":"10.57159\/gadl.jcmm.3.2.24070","article-title":"AI-driven decision support system innovations to empower higher education administration","volume":"3","author":"Zhang","year":"2024","journal-title":"J. Comput. Mech. Manag."},{"key":"ref_4","first-page":"13","article-title":"The integration of artificial intelligence (ai) into education systems and its impact on the governance of higher education institutions","volume":"9","author":"Mariam","year":"2024","journal-title":"Int. J. Prof. Bus. Rev."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Loh, P.K., Lee, A.Z., and Balachandran, V. (2024). Towards a hybrid security framework for phishing awareness education and defense. Future Internet, 16.","DOI":"10.3390\/fi16030086"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"28","DOI":"10.51594\/csitrj.v6i2.1824","article-title":"Disinformation in the digital era: The role of deepfakes, artificial intelligence, and open-source intelligence in shaping public trust and policy responses","volume":"6","author":"Balogun","year":"2025","journal-title":"Comput. Sci. IT Res. J."},{"key":"ref_7","unstructured":"Singh, P., and Dhiman, D.B. (2025, May 23). Exploding AI-Generated Deepfakes and Misinformation: A Threat to Global Concern in the 21st Century. Available at SSRN 4651093. Available online: https:\/\/www.qeios.com\/read\/DPLE2L."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Lin, L.S., Aslett, D., Mekonnen, G., and Zecevic, M. (2025, May 22). The Dangers of Voice Cloning and How to Combat It. Available online: https:\/\/theconversation.com\/the-dangers-of-voice-cloning-and-how-to-combat-it-239926.","DOI":"10.64628\/AA.dyh7pmp79"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10734-022-00937-2","article-title":"Discourses of artificial intelligence in higher education: A critical literature review","volume":"86","author":"Bearman","year":"2023","journal-title":"High. Educ."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2069","DOI":"10.1007\/s13384-025-00801-z","article-title":"What generative Artificial Intelligence priorities and challenges do senior Australian educational policy makers identify (and why)?","volume":"52","author":"Bower","year":"2025","journal-title":"Aust. Educ. Res."},{"key":"ref_11","unstructured":"Lodge, J.M. (2024). The evolving risk to academic integrity posed by generative artificial intelligence: Options for immediate action. Tert. Educ. Qual. Stand. Agency, 8, Available online: https:\/\/www.teqsa.gov.au\/sites\/default\/files\/2024-08\/evolving-risk-to-academic-integrity-posed-by-generative-artificial-intelligence.pdf."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"57","DOI":"10.5152\/tao.2019.4058","article-title":"A guide for systematic reviews: PRISMA","volume":"57","year":"2019","journal-title":"Turk. Arch. Otorhinolaryngol."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Yazdanifard, R., Oyegoke, T., and Seyedi, A.P. (2012). Cyber-crimes: Challenges of the millennium age. Advances in Electrical Engineering and Electrical Machines, Springer.","DOI":"10.1007\/978-3-642-25905-0_68"},{"key":"ref_14","unstructured":"Tan, S. (2023). Regulating online harms: Are current efforts working\u2013or even workable?. RSIS Comment., 170-23, Available online: https:\/\/dr.ntu.edu.sg\/entities\/publication\/068523a4-583b-4df8-8cd3-95166a9723a9."},{"key":"ref_15","first-page":"1","article-title":"Mixed methods appraisal tool (MMAT), version 2018","volume":"1148552","author":"Hong","year":"2018","journal-title":"Regist. Copyr."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1057\/sj.2008.12","article-title":"The function of security in reducing women\u2019s fear of crime in open public spaces: A case study of serial sex attacks at a Western Australian university","volume":"22","author":"Cubbage","year":"2009","journal-title":"Secur. J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"21582440211000049","DOI":"10.1177\/21582440211000049","article-title":"Encouraging Employee Engagement With Cybersecurity: How to Tackle Cyber Fatigue","volume":"11","author":"Reeves","year":"2021","journal-title":"SAGE Open"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10805-021-09429-x","article-title":"Understanding Academic Integrity Education: Case Studies from Two Australian Universities","volume":"21","author":"Striepe","year":"2023","journal-title":"J. Acad. Ethics"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s40979-021-00099-1","article-title":"Does an educative approach work? A reflective case study of how two Australian higher education Enabling programs support students and staff uphold a responsible culture of academic integrity","volume":"18","author":"Fudge","year":"2022","journal-title":"Int. J. Educ. Integr."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1109\/TE.2024.3432101","article-title":"Framework for Adoption of Generative Artificial Intelligence (GenAI) in Education","volume":"67","author":"Samar","year":"2024","journal-title":"IEEE Trans. Educ."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"1262","DOI":"10.1080\/07294360.2020.1721440","article-title":"Analysing the quality of Australian universities\u2019 student anti-bullying policies","volume":"39","author":"Vaill","year":"2020","journal-title":"High. Educ. Res. Dev."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1177\/0004944115627557","article-title":"Cyberbullying and the role of the law in Australian schools: Views of senior officials","volume":"60","author":"Young","year":"2016","journal-title":"Aust. J. Educ."},{"key":"ref_23","first-page":"17","article-title":"A study of cybercrime victimisation and prevention: Exploring the use of online crime prevention behaviours and strategies","volume":"6","author":"Jacqueline","year":"2020","journal-title":"J. Criminol. Res. Policy Pract."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/1045988X.2021.2007835","article-title":"The education and the legal system: Inter-systemic collaborations identified by Australian schools to more effectively reduce cyberbullying","volume":"66","author":"Pennell","year":"2022","journal-title":"Prev. Sch. Fail."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"827","DOI":"10.1007\/s13384-021-00452-w","article-title":"Should Australia have a law against cyberbullying? Problematising the murky legal environment of cyberbullying from perspectives within schools","volume":"49","author":"Pennell","year":"2022","journal-title":"Aust. Educ. Res."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1177\/14614448211055366","article-title":"Sexuality, gender and culturally diverse interpretations of cyberbullying","volume":"26","author":"Sheanoda","year":"2024","journal-title":"New Media Soc."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Jayshri, N. (2025). Comprehensive Review of Digital Harassment Prevention and Intervention Strategies: Bystanders, Automated Content Moderation, Legal Frameworks, AI, Education, Reporting, and Blocking. Int. J. Multidiscip. Res., 7.","DOI":"10.36948\/ijfmr.2025.v07i01.35230"},{"key":"ref_28","unstructured":"Australia\u2019s Cyber Security Strategy (2020). Australia\u2019s Cyber Security Strategy 2020 at a Glance, Commonwealth of Australia."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Bell, M., Keles, S., Furenes Klippen, M.I., Caravita, S.C.S., and Fandrem, H. (2025). Cooperation within the school community to overcome cyberbullying: A systematic scoping review. Scand. J. Educ. Res., 1\u201316.","DOI":"10.1080\/00313831.2025.2476504"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"102711","DOI":"10.1016\/j.cpa.2024.102711","article-title":"A critical review of AI in accounting education: Threat and opportunity","volume":"99","author":"Ballantine","year":"2024","journal-title":"Crit. Perspect. Account."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1186\/s40561-019-0098-x","article-title":"The impact of gamification on students\u2019 learning, engagement and behavior based on their personality traits","volume":"7","author":"Smiderle","year":"2020","journal-title":"Smart Learn. Environ."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"103657","DOI":"10.1016\/j.actpsy.2022.103657","article-title":"Gamification for behavior change: A scientometric review","volume":"228","author":"Bassanelli","year":"2022","journal-title":"Acta Psychol."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1017\/jgc.2021.20","article-title":"Using participatory design to inform cyber\/bullying prevention and intervention practices: Evidence-Informed insights and strategies","volume":"31","author":"Spears","year":"2021","journal-title":"J. Psychol. Couns. Sch."},{"key":"ref_34","first-page":"251","article-title":"The impact and management of mis\/disinformation at university libraries in Australia","volume":"72","author":"Johnston","year":"2023","journal-title":"J. Aust. Libr. Inf. Assoc."},{"key":"ref_35","unstructured":"Salem, L., Fiore, S., Kelly, S., and Brock, B. (2021). Evaluating the Effectiveness of Turnitin\u2019s AI Writing Indicator Model, Temple University."},{"key":"ref_36","first-page":"1","article-title":"First 100 days of ChatGPT at Australian universities: An analysis of policy landscape and media discussions about the role of AI in higher education","volume":"1","author":"Fowler","year":"2023","journal-title":"Learn. Lett."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"e32","DOI":"10.1017\/dap.2021.20","article-title":"The role of artificial intelligence in disinformation","volume":"3","author":"Bontridder","year":"2021","journal-title":"Data Policy"},{"key":"ref_38","first-page":"124","article-title":"Analysis of Artificial Intelligence Policies for Higher Education in Europe","volume":"9","author":"Stracke","year":"2025","journal-title":"Int. J. Interact. Multimed. Artif. Intell."},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Williamson, S.M., and Prybutok, V. (2024). The era of artificial intelligence deception: Unraveling the complexities of false realities and emerging threats of misinformation. Information, 15.","DOI":"10.3390\/info15060299"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Khairullah, S.A., Harris, S., Hadi, H.J., Sandhu, R.A., Ahmad, N., and Alshara, M.A. (2025). Implementing artificial intelligence in academic and administrative processes through responsible strategic leadership in the higher education institutions. Front. Educ., 10.","DOI":"10.3389\/feduc.2025.1548104"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1186\/s41239-023-00408-3","article-title":"A comprehensive AI policy education framework for university teaching and learning","volume":"20","author":"Chan","year":"2023","journal-title":"Int. J. Educ. Technol. High. Educ."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Braun, T. (2025). Liability for artificial intelligence reasoning technologies\u2013a cognitive autonomy that does not help. Corp. Gov. Int. J. Bus. Soc.","DOI":"10.1108\/CG-09-2024-0471"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Khan, R.H., and Balapumi, R. (2025). Artificial Intelligence (AI) as Strategy to Gain Competitive Advantage for Australian Higher Education Institutions (HEI) Under the New Post COVID-19 Scenario. Artificial Intelligence-Enabled Businesses: How to Develop Strategies for Innovation, Scrivener Publishing LLC.","DOI":"10.1002\/9781394234028.ch24"},{"key":"ref_44","unstructured":"Lin, L.S., Aslett, D., Mekonnen, G., and Zecevic, M. (2025, November 22). The UN Cybercrime Convention: What It Means for Policing and Community Safety in Australia. Available online: https:\/\/www.internationalaffairs.org.au\/australianoutlook\/the-un-cybercrime-convention-what-it-means-for-policing-and-community-safety-in-australia\/."},{"key":"ref_45","unstructured":"Wardle, C., and Derakhshan, H. (2017). Information Disorder: Toward an Interdisciplinary Framework for Research and Policymaking, Council of Europe Strasbourg."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Luu, X., Rathjens, C., Swadling, M., Gresham, B., Hockman, L., Scott-Young, C., Leifels, K., Zadow, A.J., Dollard, M.F., and Kent, L. (2024). How university climate impacts psychosocial safety, psychosocial risk, and mental health among staff in Australian higher education: A qualitative study. High. Educ.","DOI":"10.1007\/s10734-024-01376-x"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1177\/1741659020953451","article-title":"The discursive production of public inquiries: The case of Australia\u2019s Royal Commission into Institutional Responses to Child Sexual Abuse","volume":"17","author":"Mitchell","year":"2021","journal-title":"Crime Media Cult."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s44217-024-00126-6","article-title":"The role and impact of ChatGPT in educational practices: Insights from an Australian higher education case study","volume":"3","author":"Sandu","year":"2024","journal-title":"Discov. Educ."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1108\/JFC-11-2019-0149","article-title":"Drug mule for love","volume":"30","author":"Whitty","year":"2023","journal-title":"J. Financ. Crime"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/s10734-021-00778-5","article-title":"Submission or subversion: Survival and resilience of Chinese international research students in neoliberalised Australian universities","volume":"84","author":"Xing","year":"2022","journal-title":"High. Educ."}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/12\/4\/132\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,1]],"date-time":"2025-12-01T10:13:16Z","timestamp":1764583996000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/12\/4\/132"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,28]]},"references-count":50,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["informatics12040132"],"URL":"https:\/\/doi.org\/10.3390\/informatics12040132","relation":{},"ISSN":["2227-9709"],"issn-type":[{"value":"2227-9709","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,28]]}}}