Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Foreign Countries | 2 |
| Internet | 2 |
| Questionnaires | 2 |
| Student Behavior | 2 |
| College Students | 1 |
| Comparative Analysis | 1 |
| Correlation | 1 |
| Costs | 1 |
| Crime | 1 |
| Educational Games | 1 |
| More ▼ | |
Author
| Hou, Huei-Tse | 1 |
| Hwang, Jae-Won | 1 |
| Kim, Rosemary | 1 |
| Kuo, Cian-Yu | 1 |
| Lin, Yu-Yan | 1 |
| Sun, Jerry Chih-Yuan | 1 |
| Yoon, Cheolho | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Research | 2 |
| Tests/Questionnaires | 2 |
Education Level
| Elementary Education | 1 |
| Grade 5 | 1 |
| Grade 6 | 1 |
| Higher Education | 1 |
| Intermediate Grades | 1 |
| Middle Schools | 1 |
| Postsecondary Education | 1 |
Audience
Location
| South Korea | 1 |
| Taiwan | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sun, Jerry Chih-Yuan; Kuo, Cian-Yu; Hou, Huei-Tse; Lin, Yu-Yan – Educational Technology & Society, 2017
The purposes of this study were to provide a game-based anti-phishing lesson to 110 elementary school students in Taiwan, explore their learning behavioral patterns, and investigate the effects of the flow states on their learning behavioral patterns and learning achievement. The study recorded behaviour logs, and applied a pre- and post-test on…
Descriptors: Educational Games, Electronic Learning, Educational Technology, Elementary School Students
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security

Peer reviewed
Direct link
