Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Computer Use | 7 |
Information Technology | 7 |
Computer Mediated… | 4 |
Information Security | 4 |
Internet | 3 |
Knowledge Level | 3 |
Risk | 3 |
Access to Information | 2 |
Computer Games | 2 |
Crime | 2 |
More ▼ |
Source
Online Submission | 2 |
ProQuest LLC | 2 |
Educational Media… | 1 |
Information Systems Education… | 1 |
Journal of Education and… | 1 |
Author
Anderson, Jimmeka | 1 |
Aytaç, Tufan | 1 |
Erdem, Mustafa | 1 |
Gezer, Tuba | 1 |
Kansu, Ceren Çevik | 1 |
Martin, Florence | 1 |
Mawel, Maurice | 1 |
Polly, Drew | 1 |
Reddy, Dinesh Sampangirama | 1 |
Sambasivam, Samuel | 1 |
Wang, WeiChao | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Research | 4 |
Dissertations/Theses -… | 2 |
Reports - Descriptive | 1 |
Education Level
Elementary Education | 2 |
Higher Education | 2 |
Postsecondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Location
Turkey | 1 |
Turkey (Ankara) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Mawel, Maurice; Sambasivam, Samuel – Information Systems Education Journal, 2023
The principal investigator (PI) conducted this research study to explore the strategic cybersecurity defense IT Managers should implement to reduce healthcare data breaches. The PI conducted a systematic literature review and selected articles that addressed healthcare data security breaches, information disclosure, cybersecurity in healthcare,…
Descriptors: Information Security, Information Technology, Confidential Records, Health Services
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Reddy, Dinesh Sampangirama – ProQuest LLC, 2017
Cybersecurity threats confront the United States on a daily basis, making them one of the major national security challenges. One approach to meeting these challenges is to improve user cybersecurity behavior. End user security behavior hinges on end user acceptance and use of the protective information technologies such as anti-virus and…
Descriptors: Computer Security, Information Security, Information Technology, Self Efficacy
Martin, Florence; Gezer, Tuba; Anderson, Jimmeka; Polly, Drew; Wang, WeiChao – Educational Media International, 2021
Children are exposed to digital devices at an early age. This study examines parents' perception of student digital safety on technology use, time spent, parent concerns and knowledge on various digital safety topics. Through a survey-based study, we analyzed data collected from 113 parents. Parents mentioned that their kids use Internet via…
Descriptors: Parent Attitudes, Child Safety, Internet, Handheld Devices
Kansu, Ceren Çevik; Öksüz, Yücel – Journal of Education and Training Studies, 2019
This study was aimed to determine of their perceptions and levels of digital citizenship for pre-service classroom teachers. The study was conducted with 76 senior pre-service classroom teachers at Education Faculty of B. U. The study is survey research. In this research, "The Digital Citizenship Scale" developed by Kocadag (2012) was…
Descriptors: Preservice Teachers, Student Attitudes, Technological Literacy, Information Technology
Webb, James O., Jr. – ProQuest LLC, 2012
There is a perception that there are risks and benefits associated with the use of online social networking media within a military organization. This research study explored this perception by investigating how employees use social networking applications and their perceptions of the benefits they receive. The study also assessed the measures…
Descriptors: Grounded Theory, Risk, Social Networks, Computer Mediated Communication
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication