NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Teachers1
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 41 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alev Üstündag; Sedef Irem Önlü; Irem Nur Akdeniz – Journal of Learning and Teaching in Digital Age, 2025
The research was conducted to determine whether there is a relationship between adolescents' social media privacy protection skills and social media addiction levels. A total of 499 adolescents between the ages of 15 and 18 participated in this correlational study. The study used a Personal Information Form, the Social Media Privacy Protection…
Descriptors: Social Media, Computer Security, Addictive Behavior, Adolescents
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cathryn Allen; Bryson R. Payne; Tamirat Abegaz; Chuck Robertson – Journal of Cybersecurity Education, Research and Practice, 2024
Research indicates that deceitful videos tend to spread rapidly online and influence people's opinions and ideas. Because of this, video misinformation via deepfake video manipulation poses a significant online threat. This study aims to discover what factors can influence viewers' capability to distinguish deepfake videos from genuine video…
Descriptors: Deception, Information Security, Video Technology, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Subasi, Sibel; Korkmaz, Özgen; Çakir, Recep – International Journal of Technology in Education and Science, 2023
The aim of this study is to examine the digital footprint awareness of students while surfing on cyberbullying, cyber security and social networks with demographic data such as class, school, gender, internet usage level. This research was carried out using a descriptive survey model. The study group of the research consisted of 467 volunteer…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Secondary School Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Witman, Paul D.; Mackelprang, Scott – Journal of Cybersecurity Education, Research and Practice, 2022
In mid-July 2020, the social media site Twitter had over 100 of its most prominent user accounts start to tweet requests to send Bitcoin to specified Bitcoin wallets. The requests promised that the Bitcoin senders would receive their money back doubled, as a gesture of charity amidst the COVID-19 pandemic. The attack appears to have been carried…
Descriptors: Social Media, Computer Security, Crime Prevention, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Esra Merve Çaliskan; I?rem I?tegin – Journal of Cybersecurity Education, Research and Practice, 2024
With the development of technology, security, a core human concern throughout history, has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of…
Descriptors: Gender Differences, Computer Security, Information Security, Sex Role
Michael L. Schliep – ProQuest LLC, 2021
Communication privacy is constantly under threat from Nation State Adversaries (NSA). This has led many platforms, such as Facebook and Apple, to implement secure conversation cryptographic protocols in their messaging applications. However, many of the protocols do not provide provable security and do not provide other security guarantees about…
Descriptors: Privacy, Interpersonal Communication, Computer Mediated Communication, Social Media
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Bhatnagar, Neelima; Pry, Michael – Information Systems Education Journal, 2020
This paper describes a study designed to collect student perceptions of personal social media risks and their knowledge of the use of privacy and security settings in social media applications. A paper-based survey was administered to 107 students at a regional campus of a major university in western Pennsylvania, representing 10 classes and 18…
Descriptors: Undergraduate Students, Student Attitudes, Privacy, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
David Kocsis; Morgan Shepherd; Daniel L. Segal – Journal of Information Systems Education, 2025
This paper describes the development of a training module to improve students' individual online behaviors. We developed this module to integrate cyber hygiene concepts into a hands-on learning activity where students develop and secure a mobile web application using the Salesforce Developer tool. This new module aims to prepare the next…
Descriptors: Computer Software, Information Security, Computer Science Education, Teaching Methods
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brar, Raj – BU Journal of Graduate Studies in Education, 2022
Social media is an important part of all of our lives. However, there is no requirement for students in Manitoba to receive formalized education in regards to social media and its usage in the K-12 Canadian curriculum instruction. Such formalized education is extremely important for adolescents to understand the multiple facets of social media…
Descriptors: Social Media, Educational Technology, Adolescents, Foreign Countries
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Alsager, Haroon Nasser – Arab World English Journal, 2020
Numerous studies have been concerned with developing new authorship recognition systems to address the increasing rates of cybercrimes associated with the anonymous nature of social media platforms, which still offer the opportunity for the users not to reveal their true identities. Nevertheless, it is still challenging to identify the real…
Descriptors: Social Media, Semitic Languages, Authors, Computer Security
Laurel Lynn Schneider – ProQuest LLC, 2023
As the digital world evolves, so does the risk of cyberattacks. Despite technology playing a vital role in nullifying these threats, the human factor is still regarded as one of the greatest weaknesses. End-user behavior is a major cause of information security breaches. This quantitative empirical study used a single-group, pre-post-test,…
Descriptors: Computer Security, Information Security, Correlation, Knowledge Level
Shehroze Farooqi – ProQuest LLC, 2021
Popular platforms such as Facebook and Twitter integrate third-party apps from developers to enhance the experience of their users. While third-party apps are widely used to provide legitimate functionality, the abuse of third-party apps by attackers is also becoming prevalent. Attackers are abusing third-party apps to orchestrate their malicious…
Descriptors: Social Media, Computer Security, Crime Prevention, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Hermida, Martin; Imlig-Iten, Nina; Schrackmann, Iwan; Marinus, Eva – Teaching Education, 2023
With the ubiquity of digital media, managing personal data has become part of our daily lives. Teachers have to manage not only their own data, they also manage students' sensitive data and furthermore have to teach data protection to students. In Switzerland, teacher education colleges have hence started to educate students about privacy and data…
Descriptors: Preservice Teachers, Student Attitudes, Social Networks, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Alma Foster; Natasha Ellis – Educational Psychology in Practice, 2024
This paper examines, from a psychological perspective, why some young people may diagnose themselves with a mental health condition or neurodevelopmental difference after engaging with TikTok content. The article joins the discourse around TikTok self-diagnosis among adolescents, which has circulated since 2022, and offers alternative…
Descriptors: Foreign Countries, Social Media, Adolescents, Clinical Diagnosis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Raposo-Rivas, Manuela; Martínez-Figueira, María-Esther; Sarmiento Campos, José Antonio; Parrilla Latas, Angeles – Digital Education Review, 2021
Adolescents' relationship with technology is controversial both because of the possibilities it offers and because of the risks it entails, even being perceived by them as a real need. In order to improve the knowledge about it, a non-experimental research of transversal style has been carried out using a methodology based on data mining. 1,048…
Descriptors: Adolescents, Student Behavior, Secondary School Students, Internet
Previous Page | Next Page »
Pages: 1  |  2  |  3