Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 2 |
Children | 1 |
Childrens Attitudes | 1 |
Computer Science Education | 1 |
Computer Software | 1 |
Computers | 1 |
Elementary School Students | 1 |
Ethics | 1 |
Faculty Development | 1 |
Grade 2 | 1 |
Handheld Devices | 1 |
More ▼ |
Author
Anna Drobná | 1 |
Cyril Brom | 1 |
Filip Dechterenko | 1 |
Katerina Kacerovská | 1 |
Kristina Volná | 1 |
Nikol Kopánková | 1 |
Pavel Ježek | 1 |
Tereza Hannemann | 1 |
Tereza Stárková | 1 |
Tereza Tetourová | 1 |
Publication Type
Journal Articles | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Elementary Education | 2 |
Grade 2 | 2 |
Early Childhood Education | 1 |
Elementary Secondary Education | 1 |
Grade 12 | 1 |
Grade 3 | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
Grade 7 | 1 |
Grade 8 | 1 |
More ▼ |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cyril Brom; Tereza Hannemann; Tereza Tetourová; Anna Drobná; Nikol Kopánková; Kristina Volná; Katerina Kacerovská; Filip Dechterenko; Pavel Ježek; Tereza Stárková – International Journal of Technology and Design Education, 2024
Primary school children frequently use digital devices, which can be infected by computer viruses. In this mixed methods paper with two studies (N = 278 + 114), we examined 8-year-olds' preconceptions about computer viruses and protection against them; how to teach these children about said topics using three different, 30-min-long,…
Descriptors: Computers, Children, Computer Security, Knowledge Level
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics