Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Mediated… | 5 |
| Computer Security | 5 |
| Guidelines | 5 |
| Internet | 3 |
| School Safety | 2 |
| Adolescents | 1 |
| Barriers | 1 |
| Behavior Standards | 1 |
| Bullying | 1 |
| Child Safety | 1 |
| College Environment | 1 |
| More ▼ | |
Source
| ACM Transactions on Computing… | 1 |
| Education Digest: Essential… | 1 |
| Online Submission | 1 |
| Social Education | 1 |
| Technology & Learning | 1 |
Author
| Abdel-Karim Al-Tamimi | 1 |
| Berson, Ilene R. | 1 |
| Berson, Michael J. | 1 |
| Khalid Samara | 1 |
| Maher Salem | 1 |
| Riley, Sheila | 1 |
| Wolfsberg, Jeffrey S. | 1 |
| Wyne, Mudasser F. | 1 |
Publication Type
| Journal Articles | 5 |
| Reports - Descriptive | 4 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Maher Salem; Khalid Samara; Abdel-Karim Al-Tamimi – ACM Transactions on Computing Education, 2024
This study focuses on the challenges encountered in online cybersecurity education. It adopts an exploratory research design using a mixed-methods approach to investigate the perceptions and experiences of postgraduate students enrolled in an online cybersecurity program. The collection of data is structured into two distinct phases. In the…
Descriptors: Information Security, Computer Security, Guidelines, Student Motivation
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Wolfsberg, Jeffrey S. – Education Digest: Essential Readings Condensed for Quick Review, 2006
Once, targets of bullying had to endure it only at school. Now, with the increasing prevalence of cyberbullying it can follow them home and go on 24 hours a day. For students who have been exposed to cyberbullying themselves, for parents who have either been exposed to it or are seeing their child experience it, and for educators who have either…
Descriptors: Computer Mediated Communication, Bullying, Computer Security, School Safety
Riley, Sheila – Technology & Learning, 2007
It is not always easy to find the balance between protecting students from Internet dangers and distractions and reaping its benefits--but it is certainly on every district's tech priority list. Sharnell Jackson, chief e-learning officer for the 415,000-student Chicago Public Schools, and Miguel Guhlin, director of instructional technology…
Descriptors: Computer Security, School Safety, Computer Mediated Communication, Parent Education
Berson, Ilene R.; Berson, Michael J. – Social Education, 2006
Internet users continue to develop new ways of communicating online and disseminating information; one of these methods, the blog, also known as web log, has become a significant cultural phenomenon. Blogs offer an interactive medium for internet users to create and contribute content to the web. In some social studies classrooms, teachers are…
Descriptors: Social Studies, Current Events, Internet, Web Sites

Peer reviewed
Direct link
