Spelling suggestions: "subject:"1nternet safety"" "subject:"centernet safety""
1 |
Not Just A "Place For Friends": Teenagers, Social Networks, and Identity VulnerabilityPruitt, Cenate 07 January 2012 (has links)
This study is an empirical analysis of adolescents' risk management on internet social network sites such as Facebook and MySpace. Using a survey of 935 U.S. adolescents gathered by the Pew Internet and American Life Project, I investigate the influence of offline social networks on online socialization, as well as the impact of parental and self mediation tactics on risky online information-sharing practices. Overall, the relationship between offline social network strength and online communications methods was inconclusive, with results suggesting that most teens use online communications in similar ways, regardless of offline connectedness. Some relationships were discovered between parental and individual mediation tactics and risky online information sharing, largely supporting the use of active mediation techniques by parents and informed control of shared information by individual users. User demographics had a strong effect on risky information sharing, with gender and age playing a significant role. This study also offers some suggestions for parents and policy-makers interested in the topic.
|
2 |
An Examination of Internet Filtering and Safety Policy Trends and Issues in South Carolina's K-12 Public SchoolsVicks, Mary E. 01 January 2013 (has links)
School districts have implemented filtering and safety policies in response to legislative and social mandates to protect students from the proliferation of objectionable online content. Subject related literature suggests these policies are more restrictive than legal mandates require and are adversely affecting information access and instruction. There is limited understanding of how filtering and safety policies are affecting teaching and learning because no comprehensive studies have investigated the issues and trends surrounding filtering and safety policy implementation. In order to improve existing safety policies, policymakers need research-based data identifying end user access issues that limit technology integration in the kindergarten-12th grade (K-12) educational setting.
This study sought to examine Internet filtering and safety policy implementation issues in South Carolina's K-12 public schools to determine their influence on information access and instruction. A mixed methods research design, which includes both quantitative and qualitative approaches, was used to investigate the research problem. Quantitative data were collected from information technology (IT) administrators who were surveyed regarding filtering and safety policy implementation, and school library media specialists (SLMS) were surveyed concerning the issues they encounter while facilitating information access in a filtered environment. Qualitative data were collected through interviews with a subset of the SLMS population, thereby providing further insight about Internet access issues and their influence on teaching and learning. School districts' Acceptable Use Policies (AUPs) were analyzed to determine how they addressed recent legislative mandates to educate minors about specific Web 2.0 safety issues.
The research results support the conclusions of previous anecdotal studies which show that K-12 Internet access policies are overly restrictive, resulting in inhibited access to online educational resources. The major implication of this study is that existing Internet access policies need to be fine-tuned in order to permit greater access to educational content. The study recommends Internet safety practices that will empower teachers and students to access the Internet's vast educational resources safely and securely while realizing the Internet's potential to enrich teaching and learning.
|
3 |
Information security awareness in small information technology-dependent business organisations25 March 2015 (has links)
M.A. (Business Management) / Small businesses thrive in the developing economy of South Africa and address the important issue of unemployment and poverty that exist in the country. A large number of these business organisations can be found in the province of Gauteng because of the large and diverse economic contribution the province delivers to the economy of South Africa. With the increased use of technology in the small businesses of Gauteng and South Africa, the risks around cyber-security, information security and other IT-related threats that can harm the businesses increase. As part of the related IT risks comes the information security awareness of the businesses. Research findings show that little to no information security awareness exists in the small IT-dependent business organisations of Gauteng, South Africa. New knowledge has been gained from the information technology uses and information security awareness that exists in small business organisations. This knowledge is specific to the small business organisations of South Africa which places an African context to a global debate of information security awareness.
|
4 |
Investigating the effectiveness of a “Surfing Safely” school educational initiative in increasing the awareness of vulnerable children with regards to Internet safety and risks in a Jewish community schoolGerson, Ilanit 01 October 2014 (has links)
M.Ed. (Educational Psychology) / “Surfing Safely” was an educational initiative created by the researcher aimed at equipping Grades 7, 8 and 9 learners and their parents with sufficient knowledge to understand and appreciate the benefits and risks of electronic media, particularly the Internet, smart-phones, iPods, iPads and other Internet-based devices. It aimed to educate learners collaboratively with the teacher on how to use the Internet safely, adjust security settings, and how to deal with involuntary exposure to objectionable materials. This was directed at empowering children to take control of their use of the Internet, learning how to cope with unwholesome exposures online, and knowing how to report such incidents to appropriate authorities. The focus of the researcher was on vulnerable learners in particular. The purpose of this study was to investigate whether the programme was effective overall as an educational initiative in changing the way learners perceive and use technology. It had five aims by which change was measured: self-mastery; rewards and risks of technology; addiction to the Internet or cellular telephones and time wastage; online interpersonal relationships; and Internet safety. The educational value of the programme is also studied. This research was conducted within a theoretical framework informed by critical theory, with a focus on empowerment (Mouton, 2004) and bio-ecological systems theory within the ambit of an holistic community approach. Developmental stages were thus applied according to the African context, as will be elucidated in the study (Nsamenang, 2009; Turkle 2007). Throughout this research, the role of the researcher was to take a proactive stand in research and social policies within the community in which s/he was involved (Perkins, 1995, in Seedat, Duncan & Lazarus, 2003). A quantitative research approach with a quasi-experimental design was implemented. A one group pre-and post-test only design was selected to collect data, in the form of a Likert scale questionnaire. It asked the respondents to rate their change of awareness and behaviour from before as well as after the implementation of the programme. All 142 male and female learners who were purposefully selected were in Grades 7, 8 or 9 at a private Jewish day school and attended all six sessions of the programme...
|
5 |
Analysis of a South African cyber-security awareness campaign for schools using interdisciplinary communications frameworksLeppan, Claudette January 2017 (has links)
To provide structure to cyber awareness and educational initiatives in South Africa, Kortjan and Von Solms (2014) developed a five-layer cyber-security awareness and education framework. The purpose of the dissertation is to determine how the framework layers can be refined through the integration of communication theory, with the intention to contribute towards the practical implications of the framework. The study is approached qualitatively and uses a case study for argumentation to illustrate how the existing framework can be further developed. Drawing on several comprehensive campaign planning models, the dissertation illustrates that not all important campaign planning elements are currently included in the existing framework. Proposed changes in the preparation layer include incorporating a situational and target audience analysis, determining resources allocated for the campaign, and formulating a communication strategy. Proposed changes in the delivery layer of the framework are concerned with the implementation, monitoring and adjustment, as well as reporting of campaign successes and challenges. The dissertation builds on, and adds to, the growing literature on the development of campaigns for cyber-security awareness and education aimed at children.
|
6 |
Phishing within e-commerce: reducing the risk, increasing the trustMegaw, Gregory M January 2010 (has links)
E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
|
7 |
數位媒體與國小學童價值觀之相關性研究-以大臺北地區國小三年級學童為例 / Digital Media and Children’s Values---taking the 3rd grade elementary school students in Taipei metropolitan as an example戴麗美 Unknown Date (has links)
本研究旨在探討數位媒體與大臺北地區國民小學三年級學童價值觀之關聯性。主要研究目的為:
一、瞭解大臺北地區國小學童網路使用行為與網路安全素養現況。
二、分析背景變項、網路使用行為與網路安全素養及兒童價值觀間的相關性。
三、根據文獻探討及次級資料分析方法所得之研究結論提出建議,期能作為提供數位媒體產業者不同的省思空間,教育主管機關及後續研究者不同的關注議題。
本研究以大臺北地區國小三年級學生共339位為研究樣本,採次級資料分析的方式,將所得資料以平均數、t檢定、單因子變異數、卡方檢定、迴歸分析等方法進行統計分析,研究結果發現:
一、 居住縣市與家裡不用網路的原因以及是否知道實施電腦分級制度有顯著差異,基隆市與臺北縣學生家裡皆有沒錢買電腦的情形且不會用網路的情形較臺北市為高,城鄉仍存有數位落差。
二、 母親職業與每週電腦網路使用情形有差異,職業為商業及專門職業的母親通常比職業為農及其他的母親較會控制兒童每週網路使用天數以免學童沉迷網路影響功課。
三、 父親的學歷與對學童的上網地點有顯著差異,父親學歷為高中職以下的學童,大多透過學校提供的網路設備及連線上網,父親學歷為大專(學)及碩士者,較能在家使用網路設備,而父親學歷為博士的學童,較常在學校及家中以外的地方上網,顯示父親學歷較高的學童零用錢較寬裕,可以在網咖上網,也較會利用圖書館設施以及更有機會在父母親的辦公室等其他地方上網。
四、 居住縣市、每週使用網路天數對陌生人之防範有顯著差異,臺北市的學童較會防範網路上認識的陌生人以及不易洩露個人基本資料;而每週使用網路天數得分較高的學童,則越懂得防範陌生人。
五、 性別、父親學歷與網路使用安全規範有顯著差異,女生較會注意網路安全規範,父母亦較會監督女生的上網行為;而父親學歷國中以下的學童對網路使用規範較父親學歷為高中職的學童優,顯示父親學歷較低的兒童以在學校上網機會為多,亦較能遵守學校網路使用規定及依照自己的年齡瀏覽適合的網頁。
六、 宗教信仰、父親學歷則會影響父母是否會在家中設定電腦分級制度,家庭有宗教信仰的父母較家庭無宗教信仰的父母會注意學童的上網安全並且作網路分級設定;而父親學歷越高越會在家中設定網路分級,但學童似乎因而選擇不在家中上網,而在網咖等其他地方上網,頗值得注意。
七、 性別、父親學歷對人際價值有顯著差異,顯示女生較男生、父親學歷為國中以下的學童較父親學歷為高中職的學童得分為優,越注重人際關係和團體歸屬感。
八、 性別對情感價值有顯著差異,顯示女生較男生重視親情與友情。
十、 性別對宗教價值有顯著差異,顯示女生對於宗教的規範與期許較男生認知為優。
十一、性別與生理價值有顯著相關。顯示女生對於健康、外貌與體態的重視程度較男生為高。
最後根據研究結果對於教育工作者、數位媒體產業與後續研究提供建議。 / This thesis is to discuss whether children’s usage of digital media is related to their values. The research purpose includes:
1. To understand children’s Internet safety literacy and using behaviors in Taipei metropolitan;
2. To analyze the relationship between children’s values and related background valuables, internet using behavior, as well as their internet safety literacy;
3. To provide suggestions to digital industrials, educators, and researchers for exploring the impact of digital media upon children’s growth and development.
Based on data analysis for a questionnaire survey with 339 respondents. The findings are listed as the following:
1. There is digital divide between children living in Taipei City, Taipei County, and Keelung City. Children living in Taipei County and Keelung City can neither afford to have a computer at home nor use internet;
2. According to t-test, the difference of mother’s occupation would affect children’s internet using frequency;
3. The difference of father’s education level would affect children’s internet using position;
4. Children’s internet safety literacy in Taipei city performs better than those living in Keelung City and Taipei County;
5. Female children’s internet safety literacy performs better than male ones;
6. Children raised in a religious family, their internet safety literacy performs better than those who raised in a non-religious family;
7. The higher for father’s education level, the more he sets internet rating rules at home;
8. Female children value interpersonal relationship and group association then male ones; children’s fathers with middle school degree, they values interpersonal relationship and group association than those who with high school degree;
9. Female children value family relationship and friendship;
10. Female children value religious regulation and expectation than male ones;
11. Female children value healthiness, appearance, as well body shape than male ones.
|
8 |
Dokument V síti jako vzdělávací nástroj pro publikum dětí ve věku 12 - 15 let / Document V síti as an educational tool for young audience aged 12 - 15 yearsPoláková, Klára January 2021 (has links)
The aim of this thesis is to explore the educational aspect of the documentary film V síti (Caught in the Net) and its impact on the Czech education system. The theoretical section of the thesis focuses mainly on presenting the topic of the film - child abuse on the internet. It deals with the topic of child safety on the internet and the context of the Czech school system. The thesis has the potential to be used in the classroom by those teachers who wish engage with this topic and educate both themselves and their students as it includes a whole chapter of recommended educational projects and programs suitable for education of second level students. The research section of the thesis deals with those teachers who saw a version of the film edited to be suitable for children, V Síti: Za školou, specifically their opinions on this project as an educational tool. The qualitative research posed a question: How did the film influence the second level of elementary school teachers' approach to child safety on the internet and its teaching? The data gathering was conducted through semi-structured interviews with nine elementary school teachers. The main conclusions include the fact that the pedagogues highly value the documentary film V síti: Za školou as a new educational tool for the prevention of...
|
9 |
Seed and Grow: An Attack Against Anonymized Social NetworksPeng, Wei 07 August 2012 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / Digital traces left by a user of an on-line social networking service can be abused by a malicious party to compromise the person’s privacy. This is exacerbated by the increasing overlap in user-bases among various services.
To demonstrate the feasibility of abuse and raise public awareness of this issue,
I propose an algorithm, Seed and Grow, to identify users from an anonymized social
graph based solely on graph structure. The algorithm first identifies a seed sub-graph either planted by an attacker or divulged by collusion of a small group of users, and then grows the seed larger based on the attacker’s existing knowledge of the users’ social relations.
This work identifies and relaxes implicit assumptions taken by previous works,
eliminates arbitrary parameters, and improves identification effectiveness and accuracy. Experiment results on real-world collected datasets further corroborate my expectation and claim.
|
10 |
Cybersecurity awareness among Swedish young adults in usage of public Wi-Fi networksAl Shakosh, Suhel January 2024 (has links)
The widespread availability of public Wi-Fi has significantly impacted how young adults in Sweden access the Internet for various purposes, including social interactions, academic activities, and entertainment. However, this convenience comes with substantial cybersecurity risks. This study aims to explore and understand the awareness level among young adults regarding cybersecurity threats when utilizing public Wi-Fi and to delve into the measures and strategies employed by young adults to safeguard themselves from these identified threats. The root problem addressed in this study is the potential gap in cybersecurity awareness and protective behaviors among young adults who frequently use public Wi-Fi. Understanding this gap is crucial for developing effective educational initiatives and security practices that can mitigate the risks involved. To investigate this issue, a qualitative research method was employed, involving semi-structured interviews with ten participants, balanced in gender. The interviews aimed to gather in-depth insights into the participants' motivations for using public Wi-Fi, their awareness of cybersecurity risks, and the measures they take to protect themselves. Utilizing semi-structured interviews with ten participants, the study reveals a diverse range of awareness and behaviors. While some participants demonstrate a strong understanding of cyber threats and employ proactive measures such as using VPNs and antivirus software, others show only a cursory awareness and engage in risky behaviors due to a lack of knowledge or disregard for potential threats. This variation highlights a disparity in how young adults approach cybersecurity when using public Wi-Fi. The study underscores a need for targeted educational initiatives to enhance protective practices among this demographic, which could inform future cybersecurity policies and educational programs. By focusing on increasing cybersecurity awareness and promoting better security habits, the risks associated with public Wi-Fi usage can be better managed, thereby helping to protect the digital lives of young individuals in Sweden.
|
Page generated in 0.0662 seconds