Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Correlation | 2 |
| Foreign Countries | 2 |
| Undergraduate Students | 2 |
| Behavior Patterns | 1 |
| Bullying | 1 |
| Comparative Analysis | 1 |
| Computer Mediated… | 1 |
| Computer Software | 1 |
| Deception | 1 |
| Experiential Learning | 1 |
| More ▼ | |
Source
| Journal of Learning and… | 3 |
Publication Type
| Journal Articles | 3 |
| Reports - Research | 3 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 3 |
Audience
Location
| Turkey | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zorlu, Eyup – Journal of Learning and Teaching in Digital Age, 2023
The purpose of this study is to examine the relationship between college students' cyberbullying awareness and their ability to ensure their personal cybersecurity. A total of 401 students participated in this study. The Ability to Ensure Personal Cybersecurity Scale, the Cyberbullying Awareness Scale, and a Personal Information Form developed by…
Descriptors: Bullying, Computer Mediated Communication, Computer Security, Knowledge Level
Mehmet Fatih Yigit – Journal of Learning and Teaching in Digital Age, 2025
Technology, while enhancing efficiency and effectiveness, also poses significant cyber threats and risks. Overcoming these challenges necessitates individuals to have high levels of cybersecurity awareness and to exhibit proper cybersecurity behaviors. Correspondingly, in recent years, the exploration of individual factors influencing…
Descriptors: Metacognition, Computer Security, Information Security, Student Behavior
Ghemri, Lila; Yuan, Shengli – Journal of Learning and Teaching in Digital Age, 2019
Mobile devices are fast becoming the dominant computing platform for an increasing number of people. Indeed millions of people are using their mobile phones as the main way to access the internet and social and entertainment media. This surge in mobile devices usage has been accompanied by an increase in malware specifically designed to infect…
Descriptors: Telecommunications, Handheld Devices, Computer Software, Computer Security

Peer reviewed
