Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 6 |
Descriptor
Electronic Mail | 6 |
Privacy | 6 |
Information Security | 3 |
Confidentiality | 2 |
Deception | 2 |
Disclosure | 2 |
Electronic Publishing | 2 |
Social Media | 2 |
Social Work | 2 |
Student Attitudes | 2 |
Access to Information | 1 |
More ▼ |
Source
Field Methods | 1 |
Foundation for Excellence in… | 1 |
Journal of Social Work… | 1 |
Journal of Teaching in Social… | 1 |
Mentoring & Tutoring:… | 1 |
ProQuest LLC | 1 |
Author
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Administrators | 1 |
Parents | 1 |
Policymakers | 1 |
Teachers | 1 |
Location
Canada | 1 |
North Carolina | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Brenner, Philip S. – Field Methods, 2019
In today's survey climate, many individuals doubt the legitimacy of survey invitations. Phishing, an Internet-based fraud that tricks users into disclosing private information, has the potential to further erode the perceived legitimacy of e-mailed survey invitations and harm cooperation. However, no study has tested the effect of phishing on…
Descriptors: Response Rates (Questionnaires), Experiments, Credibility, Deception
Mattison, Marian – Journal of Social Work Education, 2018
The inclusion of remote digital practices (e-mail, texting, blogging, social media) to deliver social work services raises unique ethical and legal challenges for client and practitioner. Competent care necessitates providing clients with information that would materially affect clients' decisions whether to assume the risks, benefits, and…
Descriptors: Standards, Informed Consent, Social Work, Caseworkers
Pantas, Susanna; Miller, Sean A.; Kulkarni, Shanti J. – Journal of Teaching in Social Work, 2017
Social work students created a community activism project to raise awareness about trauma prevalence and impact. Trauma theory describes silencing as the mechanism that hinders individual and community healing. Therefore, students sought to create an interactive opportunity to heighten trauma visibility on campus. They created a physical mailbox…
Descriptors: Activism, Social Work, Counselor Training, Trauma
Christofides, Emily; Wood, Eileen; Benn, Amanda Catherine; Desmarais, Serge; Westfall, Krista – Mentoring & Tutoring: Partnership in Learning, 2017
Disclosure is a critical element of interpersonal relationships and individuals are often evaluated on what they share with others, whether in personal, professional, or learning contexts. Technology now allows for many different outlets for communicating with other people. We used experimental methods to explore the impact of communication medium…
Descriptors: Mentors, Peer Relationship, Research Design, Student Surveys
Foundation for Excellence in Education (ExcelinEd), 2016
Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…
Descriptors: Student Records, Information Security, Privacy, Information Utilization