[go: up one dir, main page]

Fodeman et al., 2009 - Google Patents

The impact of Facebook on our students

Fodeman et al., 2009

Document ID
513716837630609150
Author
Fodeman D
Monroe M
Publication year
Publication venue
Teacher Librarian

External Links

Snippet

Couple this false sense of privacy with the feeling of anonymity and lack of social responsibility that often develops from using text-centered telecommunications, and we see that many students post embarrassing, humiliating, denigrating and hurtful content in both …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/105Human resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
    • G06Q40/025Credit processing or loan processing, e.g. risk analysis for mortgages
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/101Collaborative creation of products or services

Similar Documents

Publication Publication Date Title
Fodeman et al. The impact of Facebook on our students.
Ali et al. Privacy and security issues in online social networks
Daengsi et al. Cybersecurity awareness enhancement: a study of the effects of age and gender of Thai employees associated with phishing attacks
Zeebaree et al. Social media networks security threats, risks and recommendation: A case study in the kurdistan region
Gharibi et al. Cyber threats in social networking websites
Pusey et al. Cyberethics, cybersafety, and cybersecurity: Preservice teacher knowledge, preparedness, and the need for teacher education to make a difference
Furnell End-user security culture: a lesson that will never be learnt?
Cowie et al. Cyberbullying: sanctions or sensitivity?
Lim et al. Design of security training system for individual users
Frauenstein et al. Social network phishing: Becoming habituated to clicks and ignorant to threats?
Chang et al. Cybersecurity for children: an investigation into the application of social media
DeFranco Teaching Internet Security, Safety in Our Classrooms.
Zolait et al. User awareness of social media security: the public sector framework
Boyd et al. The conundrum of visibility: Youth safety and the Internet
Kauer et al. A comparison of American and German folk models of home computer security
Nyasvisvo et al. Phishing attacks: A security challenge for university students studying remotely
Frauenstein An investigation into students responses to various phishing emails and other phishing-related behaviours
Seng et al. A look into user privacy andthird-party applications in Facebook
Oxley A best practices guide for mitigating risk in the use of social media
Shelke et al. Social networking: its uses and abuses
Agarwal et al. Securing our digital natives: A study of commonly experience internet safety issues and a one-stop solution
Norden How the internet has changed the face of crime
Popescul et al. Social networks security in universities: Challenges and solutions
Lang et al. Social networking and personal data security: a study of attitudes and public awareness in Ireland
Breitinger et al. Survey results on adults and cybersecurity education