Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 8 |
Descriptor
| Attitude Measures | 8 |
| Computer Security | 8 |
| Internet | 5 |
| Correlation | 3 |
| Information Technology | 3 |
| Regression (Statistics) | 3 |
| Bullying | 2 |
| Computer Mediated… | 2 |
| Crime Prevention | 2 |
| Foreign Countries | 2 |
| High School Students | 2 |
| More ▼ | |
Source
| ProQuest LLC | 3 |
| Behaviour & Information… | 1 |
| British Journal of Learning… | 1 |
| Journal of Computing in… | 1 |
| Journal of Psychologists and… | 1 |
| T.H.E. Journal | 1 |
Author
Publication Type
| Journal Articles | 5 |
| Reports - Research | 4 |
| Dissertations/Theses -… | 3 |
| Reports - Descriptive | 1 |
Education Level
| High Schools | 2 |
| Middle Schools | 2 |
| Elementary Education | 1 |
| Grade 7 | 1 |
| Grade 8 | 1 |
| Higher Education | 1 |
Audience
Location
| Spain | 1 |
| Turkey | 1 |
| Washington | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Chiner, Esther; Gómez-Puerta, Marcos; Cardona-Moltó, María Cristina – British Journal of Learning Disabilities, 2017
Background: Internet offers opportunities to people with intellectual disabilities, but it also involves some risks. The aim of this study was to explore these issues considering caregivers and people with intellectual disabilities' perspectives. Materials and Methods: A descriptive, cross-sectional study was conducted. The sample consisted of 77…
Descriptors: Internet, Intellectual Disability, Caregivers, Attitude Measures
Kabadayi, Fedai; Sari, Serkan V. – Journal of Psychologists and Counsellors in Schools, 2018
This study examined the role of resilience in the lives of cyberbullying perpetrators and their victims. Turkish adolescents (n = 444; 245 girls, 55.2%, and 199 boys, 44.8%) 15-19 years of age (mean age of 16.58 years, SD = 0.789) were recruited from different high schools. The participants completed the Cyberbullying Scale (Aricak, Kinay, &…
Descriptors: Resilience (Psychology), Bullying, Computer Security, Victims
Clark, Christine Y. – ProQuest LLC, 2013
Understanding the drivers to encourage employees' security compliance behavior is increasingly important in today's highly networked environment to protect computer and information assets of the company. The traditional approach for corporations to implement technology-based controls, to prevent security breaches is no longer sufficient.…
Descriptors: Computer Security, Employees, Corporations, Training
Paquet, Katherine G. – ProQuest LLC, 2013
Cloud computing may provide cost benefits for organizations by eliminating the overhead costs of software, hardware, and maintenance (e.g., license renewals, upgrading software, servers and their physical storage space, administration along with funding a large IT department). In addition to the promised savings, the organization may require…
Descriptors: Internet, Computer Software, Computers, Information Technology
Venkatesh, Vijay P. – ProQuest LLC, 2013
The current computing landscape owes its roots to the birth of hardware and software technologies from the 1940s and 1950s. Since then, the advent of mainframes, miniaturized computing, and internetworking has given rise to the now prevalent cloud computing era. In the past few months just after 2010, cloud computing adoption has picked up pace…
Descriptors: Internet, Information Technology, Information Management, Online Surveys
Lee, Doohwang; Larose, Robert; Rifon, Nora – Behaviour & Information Technology, 2008
The objective of this study is to develop and test a model of online protection behaviour, particularly regarding the use of virus protection. Hypotheses are proposed concerning the predictors of the intention to engage in virus protection behaviour. Using a survey of 273 college students who use the Internet, a test of the hypotheses is conducted…
Descriptors: Self Efficacy, Intention, Computer Security, Multiple Regression Analysis
Wright, Vivian H.; Burnham, Joy J.; Inman, Christopher T.; Ogorchock, Heather N. – Journal of Computing in Teacher Education, 2009
This study examined cyberbullying in three distinct phases to facilitate a multifaceted understanding of cyberbullying. The phases included (a) a quantitative survey, (b) a qualitative focus group, and (c) development of educational scenarios/simulations (within the Second Life virtual environment). Phase III was based on adolescent feedback about…
Descriptors: Prevention, Focus Groups, Virtual Classrooms, Bullying
Starkman, Neal – T.H.E. Journal, 2007
Through conversations with students across different grade levels, there is clear evidence that two of the things they most desire contradict each other--and they use electronic technology to get both of them. This author had conversations with three groups of students in Seattle about their favorite electronic technologies, and any concerns they…
Descriptors: Privacy, High School Students, Computer Mediated Communication, Information Technology

Peer reviewed
Direct link
