Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 6 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Games | 9 |
Computer Security | 9 |
Internet | 9 |
Foreign Countries | 7 |
Adolescents | 4 |
Information Technology | 4 |
Privacy | 4 |
Social Networks | 4 |
Bullying | 3 |
Case Studies | 3 |
Computer Mediated… | 3 |
More ▼ |
Source
Africa Education Review | 1 |
Educational Media… | 1 |
Electronic Journal of… | 1 |
International Association for… | 1 |
International Journal of… | 1 |
National Foundation for… | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Research Ethics | 1 |
Author
Anderson, Jimmeka | 1 |
Aytaç, Tufan | 1 |
Costa, Conceição | 1 |
Erdem, Mustafa | 1 |
Gezer, Tuba | 1 |
Heavin, Ciara | 1 |
Henriques, Sara | 1 |
Kritzinger, Elmarie | 1 |
Mari-Liisa Parder | 1 |
Marten Juurik | 1 |
Martin, Florence | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Research | 6 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Reports - Descriptive | 1 |
Tests/Questionnaires | 1 |
Education Level
Elementary Education | 3 |
Secondary Education | 3 |
High Schools | 2 |
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
Intermediate Grades | 1 |
Middle Schools | 1 |
More ▼ |
Audience
Location
Ireland | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Europe | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
United Nations Convention on… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Mari-Liisa Parder; Pieter Gryffroy; Marten Juurik – Research Ethics, 2024
The growing importance of researching online activities, such as cyber-deviance and cyber-crime, as well as the use of online tools (e.g. questionnaires, games, and other interactive tools) has created new ethical and legal challenges for researchers, which can be even more complicated when researching adolescents. In this article, we highlight…
Descriptors: Foreign Countries, Crime Prevention, Ethics, Computer Security
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Martin, Florence; Gezer, Tuba; Anderson, Jimmeka; Polly, Drew; Wang, WeiChao – Educational Media International, 2021
Children are exposed to digital devices at an early age. This study examines parents' perception of student digital safety on technology use, time spent, parent concerns and knowledge on various digital safety topics. Through a survey-based study, we analyzed data collected from 113 parents. Parents mentioned that their kids use Internet via…
Descriptors: Parent Attitudes, Child Safety, Internet, Handheld Devices
Kritzinger, Elmarie – Africa Education Review, 2017
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
Descriptors: School Culture, Foreign Countries, Computer Security, Safety
O'Brien, Churairat – ProQuest LLC, 2019
As young children increasingly use the Internet, the children need to learn and apply cybersecurity fundamentals to protect personal data. Teaching young students the basics of strong passwords and data protection in a K-12 classroom setting is an obvious starting point. The literature shows an absence of approved cybersecurity curriculums for use…
Descriptors: Teacher Attitudes, Information Security, Computer Security, Teaching Methods
Costa, Conceição; Sousa, Carla; Rogado, José; Henriques, Sara – International Journal of Game-Based Learning, 2017
The United Nations (UN) Convention (1989) on the Rights of the Child changed the way children are viewed and treated worldwide. The Convention has been affecting governments, civil society and the private sector. ICT driven companies on the internet should not be an exception. According to Livingstone, Carr and Byrne (2015), Internet governance…
Descriptors: Foreign Countries, Treaties, Childrens Rights, International Law
Neville, Karen; Heavin, Ciara – Electronic Journal of e-Learning, 2013
The emergence of social media has forced educators to think differently about the way learning occurs. Students and practitioners alike are using new technologies to connect with peers/colleagues, share ideas, resources and experiences for extracurricular activities. The social business gaming platform considered in this study leverages the social…
Descriptors: Foreign Countries, Social Networks, Internet, Computer Security
Wespieser, Karen – National Foundation for Educational Research, 2015
This report looks at the online activities of London's young people. The report highlights that children and young people use technology to have fun, study and communicate with others. Most children and young people have positive experiences online. On the whole they are sensible online and do not put themselves "at risk". However, the…
Descriptors: Foreign Countries, Internet, Children, Youth
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers