Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 6 |
Information Policy | 6 |
Internet | 4 |
Access to Information | 2 |
Computer Networks | 2 |
Foreign Countries | 2 |
Information Networks | 2 |
Information Security | 2 |
Information Technology | 2 |
Privacy | 2 |
Public Policy | 2 |
More ▼ |
Source
Internet Research | 1 |
Journal of Cybersecurity… | 1 |
Journal of Education for… | 1 |
Psychology in the Schools | 1 |
Technology, Pedagogy and… | 1 |
Author
Coyne, Sarah Marie | 1 |
Donald F. Norris | 1 |
Ferrin, Scott | 1 |
Heath, Melissa Allen | 1 |
Hong, Pei-lin | 1 |
Hope, Andrew | 1 |
Karmakar, Nitya L. | 1 |
Laura K. Mateczun | 1 |
Li, Jin-sheng | 1 |
Stauffer, Sterling | 1 |
Sun, Wei-qiang | 1 |
More ▼ |
Publication Type
Reports - Research | 6 |
Journal Articles | 5 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Donald F. Norris; Laura K. Mateczun – Journal of Cybersecurity Education, Research and Practice, 2023
This paper should be of interest to the readers of this journal because it addresses a subject that has received little scholarly attention; namely, local government cybersecurity. The U.S. has over 90,000 units of local government, of which almost 39,000 are "general purpose" units (i.e., municipalities, counties, towns and townships).…
Descriptors: Information Security, Computer Security, Local Government, Public Policy
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Stauffer, Sterling; Heath, Melissa Allen; Coyne, Sarah Marie; Ferrin, Scott – Psychology in the Schools, 2012
Recent meta-analyses indicate that bully prevention programs produce minimal change in student behavior. This study examined 66 high school teachers' perceptions regarding the effect of cyberbullying on students, which intervening strategies teachers would use when dealing with cyberbullying, and which prevention strategies would assist in…
Descriptors: Prevention, Intervention, Student Behavior, Fidelity
Hope, Andrew – Technology, Pedagogy and Education, 2008
In the last decade, Internet provision has become widespread within schools in many economically developed countries. Proponents of such technology have stressed the potential benefits to be gained from innovative teaching and learning opportunities. Yet, herein purity and danger are seen to co-exist, with unregulated "pollutants"…
Descriptors: Internet, Foreign Countries, Discourse Analysis, Technology Integration

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Karmakar, Nitya L. – 2002
The Internet remains as a wonder for the 21st century and its growth is phenomenon. According to a recent survey, the online population is now about 500 million globally and if this trend continues, it should reach 700 million by the end of 2002. This exponential growth of the Internet has given rise to several security, privacy and ethical…
Descriptors: Computer Security, Ethics, Federal Government, Federal Legislation