Fodeman et al., 2009 - Google Patents
The impact of Facebook on our studentsFodeman et al., 2009
- Document ID
- 513716837630609150
- Author
- Fodeman D
- Monroe M
- Publication year
- Publication venue
- Teacher Librarian
External Links
Snippet
Couple this false sense of privacy with the feeling of anonymity and lack of social responsibility that often develops from using text-centered telecommunications, and we see that many students post embarrassing, humiliating, denigrating and hurtful content in both …
- 238000005516 engineering process 0 description 6
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
- G06Q40/025—Credit processing or loan processing, e.g. risk analysis for mortgages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/101—Collaborative creation of products or services
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fodeman et al. | The impact of Facebook on our students. | |
Ali et al. | Privacy and security issues in online social networks | |
Daengsi et al. | Cybersecurity awareness enhancement: a study of the effects of age and gender of Thai employees associated with phishing attacks | |
Zeebaree et al. | Social media networks security threats, risks and recommendation: A case study in the kurdistan region | |
Gharibi et al. | Cyber threats in social networking websites | |
Pusey et al. | Cyberethics, cybersafety, and cybersecurity: Preservice teacher knowledge, preparedness, and the need for teacher education to make a difference | |
Furnell | End-user security culture: a lesson that will never be learnt? | |
Cowie et al. | Cyberbullying: sanctions or sensitivity? | |
Lim et al. | Design of security training system for individual users | |
Frauenstein et al. | Social network phishing: Becoming habituated to clicks and ignorant to threats? | |
Chang et al. | Cybersecurity for children: an investigation into the application of social media | |
DeFranco | Teaching Internet Security, Safety in Our Classrooms. | |
Zolait et al. | User awareness of social media security: the public sector framework | |
Boyd et al. | The conundrum of visibility: Youth safety and the Internet | |
Kauer et al. | A comparison of American and German folk models of home computer security | |
Nyasvisvo et al. | Phishing attacks: A security challenge for university students studying remotely | |
Frauenstein | An investigation into students responses to various phishing emails and other phishing-related behaviours | |
Seng et al. | A look into user privacy andthird-party applications in Facebook | |
Oxley | A best practices guide for mitigating risk in the use of social media | |
Shelke et al. | Social networking: its uses and abuses | |
Agarwal et al. | Securing our digital natives: A study of commonly experience internet safety issues and a one-stop solution | |
Norden | How the internet has changed the face of crime | |
Popescul et al. | Social networks security in universities: Challenges and solutions | |
Lang et al. | Social networking and personal data security: a study of attitudes and public awareness in Ireland | |
Breitinger et al. | Survey results on adults and cybersecurity education |