Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Games | 7 |
Computer Security | 7 |
Internet | 6 |
Foreign Countries | 5 |
Educational Games | 3 |
Information Security | 3 |
Information Technology | 3 |
Adolescents | 2 |
Bullying | 2 |
Computer Use | 2 |
High School Students | 2 |
More ▼ |
Source
Africa Education Review | 1 |
Educational Media… | 1 |
Electronic Journal of… | 1 |
International Journal of… | 1 |
Journal of Educational… | 1 |
Online Submission | 1 |
Research Ethics | 1 |
Author
Adamo-Villani, Nicoletta | 1 |
Anderson, Jimmeka | 1 |
Aytaç, Tufan | 1 |
Cooper, Stephen | 1 |
Costa, Conceição | 1 |
Erdem, Mustafa | 1 |
Gezer, Tuba | 1 |
Heavin, Ciara | 1 |
Henriques, Sara | 1 |
Kritzinger, Elmarie | 1 |
Mari-Liisa Parder | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 6 |
Reports - Descriptive | 1 |
Education Level
High Schools | 2 |
Higher Education | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Europe | 1 |
Ireland | 1 |
South Africa | 1 |
Turkey (Ankara) | 1 |
Laws, Policies, & Programs
United Nations Convention on… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Mari-Liisa Parder; Pieter Gryffroy; Marten Juurik – Research Ethics, 2024
The growing importance of researching online activities, such as cyber-deviance and cyber-crime, as well as the use of online tools (e.g. questionnaires, games, and other interactive tools) has created new ethical and legal challenges for researchers, which can be even more complicated when researching adolescents. In this article, we highlight…
Descriptors: Foreign Countries, Crime Prevention, Ethics, Computer Security
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Martin, Florence; Gezer, Tuba; Anderson, Jimmeka; Polly, Drew; Wang, WeiChao – Educational Media International, 2021
Children are exposed to digital devices at an early age. This study examines parents' perception of student digital safety on technology use, time spent, parent concerns and knowledge on various digital safety topics. Through a survey-based study, we analyzed data collected from 113 parents. Parents mentioned that their kids use Internet via…
Descriptors: Parent Attitudes, Child Safety, Internet, Handheld Devices
Kritzinger, Elmarie – Africa Education Review, 2017
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
Descriptors: School Culture, Foreign Countries, Computer Security, Safety
Costa, Conceição; Sousa, Carla; Rogado, José; Henriques, Sara – International Journal of Game-Based Learning, 2017
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception. According to Livingstone, Carr and Byrne (2015), Internet governance…
Descriptors: Foreign Countries, Treaties, Childrens Rights, International Law
Neville, Karen; Heavin, Ciara – Electronic Journal of e-Learning, 2013
The emergence of social media has forced educators to think differently about the way learning occurs. Students and practitioners alike are using new technologies to connect with peers/colleagues, share ideas, resources and experiences for extracurricular activities. The social business gaming platform considered in this study leverages the social…
Descriptors: Foreign Countries, Social Networks, Internet, Computer Security
Adamo-Villani, Nicoletta; Oania, Marcus; Cooper, Stephen – Journal of Educational Technology Systems, 2013
We report the development and initial evaluation of a serious game that, in conjunction with appropriately designed matching laboratory exercises, can be used to teach secure coding and Information Assurance (IA) concepts across a range of introductory computing courses. The IA Game is a role-playing serious game (RPG) in which the student travels…
Descriptors: Educational Games, Computer Games, Role Playing, Computer Security