Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Mediated… | 5 |
Computer Security | 5 |
Guidelines | 5 |
Internet | 3 |
School Safety | 2 |
Adolescents | 1 |
Barriers | 1 |
Behavior Standards | 1 |
Bullying | 1 |
Child Safety | 1 |
College Environment | 1 |
More ▼ |
Source
ACM Transactions on Computing… | 1 |
Education Digest: Essential… | 1 |
Online Submission | 1 |
Social Education | 1 |
Technology & Learning | 1 |
Author
Abdel-Karim Al-Tamimi | 1 |
Berson, Ilene R. | 1 |
Berson, Michael J. | 1 |
Khalid Samara | 1 |
Maher Salem | 1 |
Riley, Sheila | 1 |
Wolfsberg, Jeffrey S. | 1 |
Wyne, Mudasser F. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Reports - Research | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Wolfsberg, Jeffrey S. – Education Digest: Essential Readings Condensed for Quick Review, 2006
Once, targets of bullying had to endure it only at school. Now, with the increasing prevalence of cyberbullying it can follow them home and go on 24 hours a day. For students who have been exposed to cyberbullying themselves, for parents who have either been exposed to it or are seeing their child experience it, and for educators who have either…
Descriptors: Computer Mediated Communication, Bullying, Computer Security, School Safety
Riley, Sheila – Technology & Learning, 2007
It is not always easy to find the balance between protecting students from Internet dangers and distractions and reaping its benefits--but it is certainly on every district's tech priority list. Sharnell Jackson, chief e-learning officer for the 415,000-student Chicago Public Schools, and Miguel Guhlin, director of instructional technology…
Descriptors: Computer Security, School Safety, Computer Mediated Communication, Parent Education
Berson, Ilene R.; Berson, Michael J. – Social Education, 2006
Internet users continue to develop new ways of communicating online and disseminating information; one of these methods, the blog, also known as web log, has become a significant cultural phenomenon. Blogs offer an interactive medium for internet users to create and contribute content to the web. In some social studies classrooms, teachers are…
Descriptors: Social Studies, Current Events, Internet, Web Sites