Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Internet | 6 |
Social Media | 4 |
Computer Mediated… | 3 |
Foreign Countries | 3 |
Questionnaires | 3 |
Access to Information | 2 |
College Students | 2 |
Electronic Learning | 2 |
Grade 6 | 2 |
Knowledge Level | 2 |
More ▼ |
Source
Educational Technology &… | 6 |
Author
Anastasiades, Panagiotes S. | 1 |
Chen, Li-Chiou | 1 |
Hou, Huei-Tse | 1 |
Inan, Fethi A. | 1 |
Jones, Keith S. | 1 |
Kuo, Cian-Yu | 1 |
Lin, Yu-Yan | 1 |
Martin, Florence | 1 |
Miron, Eli | 1 |
Namin, Akbar S. | 1 |
Petty, Teresa | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Research | 4 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Tests/Questionnaires | 1 |
Education Level
Elementary Education | 2 |
Higher Education | 2 |
Middle Schools | 2 |
Postsecondary Education | 2 |
Grade 5 | 1 |
Grade 6 | 1 |
Intermediate Grades | 1 |
Audience
Teachers | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Martin, Florence; Wang, Chuang; Petty, Teresa; Wang, Weichao; Wilkins, Patti – Educational Technology & Society, 2018
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and "bring your own technology" initiatives, attention to these topics is becoming increasingly important. A total of 593…
Descriptors: Middle School Students, Social Media, Student Surveys, Bullying
Sun, Jerry Chih-Yuan; Kuo, Cian-Yu; Hou, Huei-Tse; Lin, Yu-Yan – Educational Technology & Society, 2017
The purposes of this study were to provide a game-based anti-phishing lesson to 110 elementary school students in Taiwan, explore their learning behavioral patterns, and investigate the effects of the flow states on their learning behavioral patterns and learning achievement. The study recorded behaviour logs, and applied a pre- and post-test on…
Descriptors: Educational Games, Electronic Learning, Educational Technology, Elementary School Students
Inan, Fethi A.; Namin, Akbar S.; Pogrund, Rona L.; Jones, Keith S. – Educational Technology & Society, 2016
Twenty individuals with visual impairments were surveyed in order to (a) understand their Internet use and (b) examine relations between metrics related to Internet use and cybersecurity-related knowledge, skills, confidence, and attitudes. Participants used the Internet for various purposes, including information search, communication, chatting,…
Descriptors: Internet, Computer Use, Computer Security, Visual Impairments
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Anastasiades, Panagiotes S.; Vitalaki, Elena – Educational Technology & Society, 2011
The introduction of the Internet at schools has raised new pedagogical challenges facing educators trying to ensure children's awareness of the possible dangers when surfing the Web. This article aims to investigate how teachers evaluate the possible dangers that students might face when surfing the Net for various educational or interpersonal…
Descriptors: Foreign Countries, Internet, Teacher Role, Elementary Education
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education