Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Mediated… | 5 |
Computer Security | 5 |
Program Effectiveness | 5 |
Privacy | 3 |
Bullying | 2 |
Classification | 2 |
Electronic Mail | 2 |
Information Security | 2 |
Information Technology | 2 |
Internet | 2 |
Models | 2 |
More ▼ |
Source
ProQuest LLC | 2 |
Contemporary School Psychology | 1 |
IEEE Transactions on Learning… | 1 |
Learning, Media and Technology | 1 |
Author
Adorjan, Michael | 1 |
Amin, Rohan Mahesh | 1 |
Anwar, M. | 1 |
Cheryl L. Beseler | 1 |
Greer, J. | 1 |
Kimberly J. Mitchell | 1 |
Lisa M. Jones | 1 |
Park, Insu | 1 |
Ricciardelli, Rosemary | 1 |
Publication Type
Journal Articles | 3 |
Reports - Research | 3 |
Dissertations/Theses -… | 2 |
Education Level
Higher Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Junior High Schools | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lisa M. Jones; Kimberly J. Mitchell; Cheryl L. Beseler – Contemporary School Psychology, 2024
School psychologists and other school professionals are increasingly turning to digital citizenship programs to improve children's online safety. However, to date, there has been no rigorous outcome evaluation of these programs. The current study used a cluster randomized control trial methodology (CRCT) to evaluate the impact of the Be Internet…
Descriptors: Elementary School Students, Computer Security, Bullying, Computer Mediated Communication
Adorjan, Michael; Ricciardelli, Rosemary – Learning, Media and Technology, 2019
While previous research identifies skepticism and some animosity among students towards school-based cyber-safety programs, drawing from focus group discussions with Canadian teens, this paper contributes to unpacking reasons for both support for 'what works' and antagonism for what is perceived to be lacking. Our findings reveal support for…
Descriptors: Information Security, Computer Security, Criticism, High School Students
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses
Park, Insu – ProQuest LLC, 2010
The purpose of this study is to explore systems users' behavior on IS under the various circumstances (e.g., email usage and malware threats, online communication at the individual level, and IS usage in organizations). Specifically, the first essay develops a method for analyzing and predicting the impact category of malicious code, particularly…
Descriptors: Hospitals, Privacy, Prediction, Computer Security
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis