NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)2
Since 2006 (last 20 years)10
Audience
Laws, Policies, & Programs
Assessments and Surveys
Program for International…1
What Works Clearinghouse Rating
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Chiner, Esther; Gómez-Puerta, Marcos; Cardona-Moltó, María Cristina – British Journal of Learning Disabilities, 2017
Background: Internet offers opportunities to people with intellectual disabilities, but it also involves some risks. The aim of this study was to explore these issues considering caregivers and people with intellectual disabilities' perspectives. Materials and Methods: A descriptive, cross-sectional study was conducted. The sample consisted of 77…
Descriptors: Internet, Intellectual Disability, Caregivers, Attitude Measures
Peer reviewed Peer reviewed
Direct linkDirect link
Kabadayi, Fedai; Sari, Serkan V. – Journal of Psychologists and Counsellors in Schools, 2018
This study examined the role of resilience in the lives of cyberbullying perpetrators and their victims. Turkish adolescents (n = 444; 245 girls, 55.2%, and 199 boys, 44.8%) 15-19 years of age (mean age of 16.58 years, SD = 0.789) were recruited from different high schools. The participants completed the Cyberbullying Scale (Aricak, Kinay, &…
Descriptors: Resilience (Psychology), Bullying, Computer Security, Victims
Clark, Christine Y. – ProQuest LLC, 2013
Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…
Descriptors: Computer Security, Employees, Corporations, Training
Paquet, Katherine G. – ProQuest LLC, 2013
Cloud computing may provide cost benefits for organizations by eliminating the overhead costs of software, hardware, and maintenance (e.g., license renewals, upgrading software, servers and their physical storage space, administration along with funding a large IT department). In addition to the promised savings, the organization may require…
Descriptors: Internet, Computer Software, Computers, Information Technology
Venkatesh, Vijay P. – ProQuest LLC, 2013
The current computing landscape owes its roots to the birth of hardware and software technologies from the 1940s and 1950s. Since then, the advent of mainframes, miniaturized computing, and internetworking has given rise to the now prevalent cloud computing era. In the past few months just after 2010, cloud computing adoption has picked up pace…
Descriptors: Internet, Information Technology, Information Management, Online Surveys
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, Doohwang; Larose, Robert; Rifon, Nora – Behaviour & Information Technology, 2008
The objective of this study is to develop and test a model of online protection behaviour, particularly regarding the use of virus protection. Hypotheses are proposed concerning the predictors of the intention to engage in virus protection behaviour. Using a survey of 273 college students who use the Internet, a test of the hypotheses is conducted…
Descriptors: Self Efficacy, Intention, Computer Security, Multiple Regression Analysis
Wright, Vivian H.; Burnham, Joy J.; Inman, Christopher T.; Ogorchock, Heather N. – Journal of Computing in Teacher Education, 2009
This study examined cyberbullying in three distinct phases to facilitate a multifaceted understanding of cyberbullying. The phases included (a) a quantitative survey, (b) a qualitative focus group, and (c) development of educational scenarios/simulations (within the Second Life virtual environment). Phase III was based on adolescent feedback about…
Descriptors: Prevention, Focus Groups, Virtual Classrooms, Bullying
Peer reviewed Peer reviewed
Direct linkDirect link
Starkman, Neal – T.H.E. Journal, 2007
Through conversations with students across different grade levels, there is clear evidence that two of the things they most desire contradict each other--and they use electronic technology to get both of them. This author had conversations with three groups of students in Seattle about their favorite electronic technologies, and any concerns they…
Descriptors: Privacy, High School Students, Computer Mediated Communication, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Leino, Kaisa – Scandinavian Journal of Educational Research, 2006
This study explores the perceptions of Finnish 15-year-olds on the advantages and disadvantages of the Internet. The data, students' written responses (N = 3112), were gathered in the context of the OECD Programme for International Student Assessment (PISA) in the spring of 2000 as a national option. The data were analysed by close reading and…
Descriptors: Foreign Countries, Adolescents, Internet, Student Attitudes
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – British Educational Research Journal, 2006
Internet access has recently been introduced into over 30,000 schools in the UK. While web provision has been heralded by some as an educational panacea, it is also recognised that there are dangers inherent in school Internet use. Adopting the cultural risk perspective, drawing upon a social-cultural analysis of Internet regulation and utilising…
Descriptors: Foreign Countries, Internet, At Risk Persons, Pornography