NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 85 results Save | Export
Giovanni Bryan Jamal McKinney – ProQuest LLC, 2021
A high number of cyber breaches in organizations occur as a result of email phishing attempts. Research has shown that cyber education has a positive impact in user awareness of attack methods resulting in the reduction of compromises from email phishing attempts. However, in some instances, cyber education does not have a positive impact on the…
Descriptors: Employees, Computer Security, Information Security, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Brenner, Philip S. – Field Methods, 2019
In today's survey climate, many individuals doubt the legitimacy of survey invitations. Phishing, an Internet-based fraud that tricks users into disclosing private information, has the potential to further erode the perceived legitimacy of e-mailed survey invitations and harm cooperation. However, no study has tested the effect of phishing on…
Descriptors: Response Rates (Questionnaires), Experiments, Credibility, Deception
Peer reviewed Peer reviewed
Direct linkDirect link
Mattison, Marian – Journal of Social Work Education, 2018
The inclusion of remote digital practices (e-mail, texting, blogging, social media) to deliver social work services raises unique ethical and legal challenges for client and practitioner. Competent care necessitates providing clients with information that would materially affect clients' decisions whether to assume the risks, benefits, and…
Descriptors: Standards, Informed Consent, Social Work, Caseworkers
Peer reviewed Peer reviewed
Direct linkDirect link
Pantas, Susanna; Miller, Sean A.; Kulkarni, Shanti J. – Journal of Teaching in Social Work, 2017
Social work students created a community activism project to raise awareness about trauma prevalence and impact. Trauma theory describes silencing as the mechanism that hinders individual and community healing. Therefore, students sought to create an interactive opportunity to heighten trauma visibility on campus. They created a physical mailbox…
Descriptors: Activism, Social Work, Counselor Training, Trauma
Peer reviewed Peer reviewed
Direct linkDirect link
Christofides, Emily; Wood, Eileen; Benn, Amanda Catherine; Desmarais, Serge; Westfall, Krista – Mentoring & Tutoring: Partnership in Learning, 2017
Disclosure is a critical element of interpersonal relationships and individuals are often evaluated on what they share with others, whether in personal, professional, or learning contexts. Technology now allows for many different outlets for communicating with other people. We used experimental methods to explore the impact of communication medium…
Descriptors: Mentors, Peer Relationship, Research Design, Student Surveys
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yang, Fang; Wang, Shudong – Turkish Online Journal of Educational Technology - TOJET, 2014
This research investigates East Asian students' perceptions towards e-learning privacy. The survey was first carried out in Japan (N1 = 255) and China (N2 = 307) in 2009. In 2012 the same survey was conducted again in these two countries but with different participants (N3 = 175, N4 = 63). To survey in different countries is to verify whether…
Descriptors: Foreign Countries, Student Attitudes, Educational Technology, Electronic Learning
Foundation for Excellence in Education (ExcelinEd), 2016
Parents expect school districts and schools to keep their children safe while they are in school. That expectation of safety and security also extends to the protection of their children's learning data. Therefore, it is critical that school districts and schools are open and transparent about their student data privacy practices, and that those…
Descriptors: Student Records, Information Security, Privacy, Information Utilization
Peer reviewed Peer reviewed
Direct linkDirect link
Mattison, Marian – Social Work, 2012
The author addresses the risks and benefits of incorporating therapeutic e-mail communication into clinical social work practice. Consumer demand for online clinical services is growing faster than the professional response. E-mail, when used as an adjunct to traditional meetings with clients, offers distinct advantages and risks. Benefits include…
Descriptors: Risk, Therapy, Methods, Social Work
Quinn, Kelly Ann – ProQuest LLC, 2012
Research on internet communication technologies by midlife and older adults has received less attention than the young, yet rapid gains in the use internet media suggest older adults have become significant users. Adoption of specific applications has emerged in patterns distinct from younger users, reflecting the different experiences and…
Descriptors: Information Technology, Internet, Older Adults, Adults
Peer reviewed Peer reviewed
Direct linkDirect link
Kim, Sora; Yi, Soon-Hyung – Children & Society, 2010
This study discusses privacy risk factors when commercial web sites target primary school children in Korea. Specifically, the authors examined types of personal information required for membership subscriptions and whether privacy policies at commercial sites for children abide by privacy guidelines. A total of 159 commercial sites targeting…
Descriptors: Risk, Foreign Countries, Content Analysis, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Stephens, James H.; Parrillo, Anthony V. – Health Educator, 2011
The confidentiality of a patient's information has been sacred since the days of Hippocrates, the Father of Medicine. Today, however, merely taking an oath to respect a patient's privacy has been overshadowed by regulations governing how certain healthcare establishments handle an individual's health information on the web. Consequently, if a…
Descriptors: Electronic Mail, Physicians, Health Insurance, Confidentiality
Hastings, Robin – Computers in Libraries, 2010
In August 2008, the Missouri River Regional Library (MRRL), where the author serves as information technology coordinator, switched over from an internally hosted Microsoft Exchange email server to the Google Apps product. As the person who led the charge to use Google Apps and the person who actually flipped the switch, he was responsible for…
Descriptors: Information Technology, Public Libraries, Privatization, Electronic Mail
Peer reviewed Peer reviewed
Direct linkDirect link
Davis, Katie; James, Carrie – Learning, Media and Technology, 2013
There is considerable debate about young people's concern for privacy today, given their frequent use of social media to share information and other content about themselves and others. While researchers have investigated the online privacy practices of teens and emerging adults, relatively little is known about the attitudes and behaviors of…
Descriptors: Privacy, Early Adolescents, Middle School Students, Preadolescents
Adebiaye, Richmond – ProQuest LLC, 2010
The proliferation of web-based communication tools like email clients vis-a-vis Yahoo mail, Gmail, and Hotmail have led to new innovations in web-based communication. Email users benefit greatly from this technology, but lack of security of these tools can put users at risk of loss of privacy, including identity theft, corporate espionage, and…
Descriptors: Computer Mediated Communication, Electronic Mail, Privacy, Social Networks
Schwartz, Harriet L. – Education Digest: Essential Readings Condensed for Quick Review, 2010
There has been much discussion about the issue of boundaries on Facebook. Some suggest faculty members can resolve potential dilemmas in relation to students by making sensible decisions about what to post and by fine-tuning privacy settings. But the challenges and opportunities run deeper. For those who want to be appropriately accessible to…
Descriptors: Electronic Mail, Social Networks, Computer Mediated Communication, Web Sites
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6