Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 6 |
Descriptor
| Internet | 6 |
| Privacy | 6 |
| Reputation | 6 |
| Social Networks | 4 |
| Computer Mediated… | 3 |
| Child Safety | 2 |
| College Students | 2 |
| Computer Security | 2 |
| Information Security | 2 |
| Interviews | 2 |
| Addictive Behavior | 1 |
| More ▼ | |
Source
| Chronicle of Higher Education | 1 |
| Corwin | 1 |
| Education for Information | 1 |
| IEEE Transactions on Learning… | 1 |
| Pew Internet & American Life… | 1 |
| Psychology of Women Quarterly | 1 |
Author
| Anita Papi | 1 |
| Anwar, M. | 1 |
| Cole, Ellen | 1 |
| Cortesi, Sandra | 1 |
| Duggan, Maeve | 1 |
| Gasser, Urs | 1 |
| Greer, J. | 1 |
| Hajdi Ivanovic | 1 |
| Kern, Margaret L. | 1 |
| Lenhart, Amanda | 1 |
| Madden, Mary | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Research | 4 |
| Reports - Descriptive | 2 |
| Books | 1 |
| Tests/Questionnaires | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
| Elementary Secondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| Croatia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Snježana Stanarevic Katavic; Hajdi Ivanovic; Anita Papi – Education for Information, 2023
University students as members of Generation Z (late 1990s and early 2000s) have rich experience in living the digital life. Previous studies show that Generation Z cares about their privacy and is more apt than older generations to implement complex privacy and security measures, but they are also more willing to compromise their privacy if they…
Descriptors: Foreign Countries, Privacy, Internet, Information Security
Rice, Alexandra – Chronicle of Higher Education, 2012
Matt Ivester became notorious on campuses across the country in 2007 for publishing gossip--not about celebrities but about students--on Juicy-Campus, the Web site he created. The site was blocked by some colleges, banned by several student governments, and threatened with legal action by several students who claimed that defaming comments on the…
Descriptors: Higher Education, Campuses, Internet, Identification
Madden, Mary; Cortesi, Sandra; Gasser, Urs; Lenhart, Amanda; Duggan, Maeve – Pew Internet & American Life Project, 2012
Most parents of teenagers are concerned about what their teenage children do online and how their behavior could be monitored by others. Some parents are taking steps to observe, discuss, and check up on their children's digital footprints. A new survey of 802 parents and their teens shows that: (1) 81% of parents of online teens say they are…
Descriptors: Adolescents, Parents, Privacy, Internet
Reid, Pamela Trotman; Cole, Ellen; Kern, Margaret L. – Psychology of Women Quarterly, 2011
How does a modern woman react to being defined by the role of wife? In our study, the authors examined the experiences, benefits, and challenges encountered by wives of college and university presidents. In a relationship where the husband has a prestigious and well-defined role, the female partner may still be expected to play a traditional role…
Descriptors: Spouses, Females, Focus Groups, Figurative Language
Willard, Nancy – Corwin, 2012
Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…
Descriptors: Child Safety, Computers, Internet, Secondary School Students
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses

Peer reviewed
Direct link
