Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 7 |
Content Analysis | 7 |
Internet | 4 |
Audits (Verification) | 3 |
Computer Networks | 3 |
Foreign Countries | 3 |
Privacy | 3 |
Differences | 2 |
Educational Technology | 2 |
Elementary School Teachers | 2 |
Information Security | 2 |
More ▼ |
Source
Journal of Education for… | 2 |
Australian Educational… | 1 |
Delta Pi Epsilon Journal | 1 |
Early Childhood Education… | 1 |
Internet Research | 1 |
Online Submission | 1 |
Author
Zhao, Jensen J. | 2 |
Zhao, Sherry Y. | 2 |
Alexander, Melody W. | 1 |
Booth, Kate | 1 |
Foley, Paul | 1 |
Jacka, Lisa | 1 |
Jayawardhena, Chanaka | 1 |
Kuzu, Abdullah | 1 |
Prior, Suzanne | 1 |
Renaud, Karen | 1 |
Truell, Allen D. | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 6 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
Australia | 1 |
Turkey | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Renaud, Karen; Prior, Suzanne – Early Childhood Education Journal, 2021
Software is developed specifically for children and this often requires them to authenticate themselves, usually by entering a password. Password hygiene is important for children, because the principles they learn in early life will often endure across their life span. Children learn from their parents, siblings, teachers, and peers. They also…
Descriptors: Childrens Literature, Books, Content Analysis, Computer Security
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Zhao, Jensen J.; Zhao, Sherry Y. – Journal of Education for Business, 2012
The authors assessed the "Fortune 500" corporations' retail e-commerce security to identify their strengths and weaknesses for improvement. They used online content analysis, information security auditing, and network security mapping for data collection and analysis. The findings indicate that most sites posted security policies; however, only…
Descriptors: Corporations, Retailing, Internet, Information Security
Zhao, Jensen J.; Truell, Allen D.; Alexander, Melody W.; Woosley, Sherry A. – Delta Pi Epsilon Journal, 2011
Objective: This study assessed the security vulnerability of the U.S. small companies' business-to-consumer (B2C) e-commerce network systems. Background: As the Internet technologies have been changing the way business is conducted, the U.S. small businesses are investing in such technologies and taking advantage of e-commerce to access global…
Descriptors: Computer Networks, Small Businesses, Computer Security, Internet
Jacka, Lisa; Booth, Kate – Australian Educational Computing, 2012
Virtual worlds are highly immersive, engaging and popular computer mediated environments being explored by children and adults. Why then aren't more teachers using virtual worlds in the classroom with primary and secondary school students? Reasons often cited are the learning required to master the technology, low-end graphics cards, poor…
Descriptors: Foreign Countries, Computer Security, Educational Technology, Regional Programs
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews

Jayawardhena, Chanaka; Foley, Paul – Internet Research, 2000
Discussion of changes in the banking industry focuses on an analysis of 12 Internet banking operations in the United Kingdom. Topics include delivery strategies; customer demand and requirements; and an evaluation of banking Web sites that considers speed, content and design, navigation, interactivity, and security. (LRW)
Descriptors: Banking, Computer Security, Content Analysis, Delivery Systems