The document discusses adherence to tech ethics among college students. It notes that while ICT has benefits for education, there are also negative impacts like cybercrime, hacking, plagiarism, and internet addiction when not used ethically. The document outlines various studies that found high percentages of students engaging in these unethical behaviors. It emphasizes that educators, parents, and institutions must play a role in teaching students to use technology responsibly and constructively by inculcating ethical values. This includes protecting systems, modeling good behavior, setting rules, and educating students and parents on social responsibilities regarding ICT use.
This document discusses characteristics of effective language for communication and reading comprehension. It identifies five key characteristics: 1) clarity through concrete rather than abstract language, 2) simplicity through direct rather than complex wording, 3) adapted language that relates to the reader's background, 4) forceful language that stimulates interest, and 5) vivid language that is descriptive. Following examples that demonstrate each characteristic, the document concludes that applying these language guidelines can make reading more meaningful and effective.
Anothe presentation which can be your reference in making your report in your EDUC 7A classes (Developmental Reading) this is the chapter 3 which focuses on what is developmental reading at its stages and the skills you need to have for proficient reading and of course the problem most kids are facing in terms of reading.
Diana Laurillard: The Conversational Framework - an approach to Evaluating e-...Yishay Mor
The document presents the Conversational Framework, an approach to evaluating formative e-assessment based on learning theory. It describes different learning theories (instructivism, constructionism, social constructivism) and represents them in a common framework. This framework can be used to test conventional and digital methods of formative assessment by analyzing how they support acquisition, inquiry, discussion, practice, collaboration, and production of knowledge. The framework challenges technologies to integrate capabilities that support the full learning process according to established learning theories and principles of formative assessment.
This document discusses information and communication technology (ICT) and its impact on society. ICT is defined as the use of electronic devices and software to store, process, transmit and retrieve information. The document then covers the evolution of computers through different generations. It discusses how ICT is used in education, banking, industry and e-commerce. It also compares computerized and non-computerized systems. The document outlines some impacts of ICT on society such as faster communication, social problems, lower costs and effective sharing of information. It discusses computer ethics, intellectual property, privacy and cyber law. Security threats to computers like malicious code and hacking are also mentioned.
1. Reading is a psycho-social process that involves the interaction between the reader and text and is influenced by one's social and mental development. It engages people across professions and borders.
2. Comprehension involves understanding the literal meaning of a text as well as making inferences beyond the literal meaning. It is influenced by a reader's prior knowledge and experiences.
3. Barriers to reading comprehension can be physical, psychological, environmental, or socioeconomic in nature. Effective reading strategies include making connections, asking questions, visualizing, inferring, determining importance, and synthesizing information.
Personal factors as predictors of content specific use of the internet by aja...Alexander Decker
This document summarizes a study that examined how personal factors predict the content that university students access online. A survey was conducted of 200 students at Ajayi Crowther University in Nigeria. The study found that 40.5% of students used the internet for social networking, 32.8% for news and information, and 18.5% for entertainment. While all personal factors considered accounted for 67% of the variation in content choice, only academic level, religion, and socioeconomic status significantly influenced what content students accessed. The personal factors examined were age, gender, religion, socioeconomic status, and academic level.
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Nat Rice
1) The study examined awareness of safe and responsible internet use among 103 university students in Malaysia aged 19-24.
2) The findings showed that students felt somewhat safe online and had a good understanding of risky online activities and how to protect themselves.
3) However, students still recognized the importance of learning about internet safety, as they displayed some risky password practices and lacked parental controls at home.
This document discusses characteristics of effective language for communication and reading comprehension. It identifies five key characteristics: 1) clarity through concrete rather than abstract language, 2) simplicity through direct rather than complex wording, 3) adapted language that relates to the reader's background, 4) forceful language that stimulates interest, and 5) vivid language that is descriptive. Following examples that demonstrate each characteristic, the document concludes that applying these language guidelines can make reading more meaningful and effective.
Anothe presentation which can be your reference in making your report in your EDUC 7A classes (Developmental Reading) this is the chapter 3 which focuses on what is developmental reading at its stages and the skills you need to have for proficient reading and of course the problem most kids are facing in terms of reading.
Diana Laurillard: The Conversational Framework - an approach to Evaluating e-...Yishay Mor
The document presents the Conversational Framework, an approach to evaluating formative e-assessment based on learning theory. It describes different learning theories (instructivism, constructionism, social constructivism) and represents them in a common framework. This framework can be used to test conventional and digital methods of formative assessment by analyzing how they support acquisition, inquiry, discussion, practice, collaboration, and production of knowledge. The framework challenges technologies to integrate capabilities that support the full learning process according to established learning theories and principles of formative assessment.
This document discusses information and communication technology (ICT) and its impact on society. ICT is defined as the use of electronic devices and software to store, process, transmit and retrieve information. The document then covers the evolution of computers through different generations. It discusses how ICT is used in education, banking, industry and e-commerce. It also compares computerized and non-computerized systems. The document outlines some impacts of ICT on society such as faster communication, social problems, lower costs and effective sharing of information. It discusses computer ethics, intellectual property, privacy and cyber law. Security threats to computers like malicious code and hacking are also mentioned.
1. Reading is a psycho-social process that involves the interaction between the reader and text and is influenced by one's social and mental development. It engages people across professions and borders.
2. Comprehension involves understanding the literal meaning of a text as well as making inferences beyond the literal meaning. It is influenced by a reader's prior knowledge and experiences.
3. Barriers to reading comprehension can be physical, psychological, environmental, or socioeconomic in nature. Effective reading strategies include making connections, asking questions, visualizing, inferring, determining importance, and synthesizing information.
Personal factors as predictors of content specific use of the internet by aja...Alexander Decker
This document summarizes a study that examined how personal factors predict the content that university students access online. A survey was conducted of 200 students at Ajayi Crowther University in Nigeria. The study found that 40.5% of students used the internet for social networking, 32.8% for news and information, and 18.5% for entertainment. While all personal factors considered accounted for 67% of the variation in content choice, only academic level, religion, and socioeconomic status significantly influenced what content students accessed. The personal factors examined were age, gender, religion, socioeconomic status, and academic level.
Awareness Of Safe And Responsible Use Of ICT Among Students In A Malaysian Un...Nat Rice
1) The study examined awareness of safe and responsible internet use among 103 university students in Malaysia aged 19-24.
2) The findings showed that students felt somewhat safe online and had a good understanding of risky online activities and how to protect themselves.
3) However, students still recognized the importance of learning about internet safety, as they displayed some risky password practices and lacked parental controls at home.
It ethics undergraduates’ perception based on their awarenessAlexander Decker
This document discusses a study that explored undergraduate students' perceptions of ethical information technology use based on their awareness. The study surveyed 542 students from 4 universities in Pakistan about various computer and internet activities, asking them to label each as right, wrong, or neither. The results found that many students lacked prior training in computer ethics and had little knowledge about the topic. Female students, those from public universities, computing/IT departments, and science disciplines generally had more positive views of ethical IT use. Minimal differences were seen based on prior IT training or ethics knowledge. This suggests computer ethics training is needed for all university students.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
The document presents a review of using machine learning algorithms to detect cyber harassment on social networking websites. It discusses past research on cyberbullying detection and proposes a system to train models on Twitter and Wikipedia datasets to classify text as containing cyberbullying or not, using natural language processing and support vector machines. The goal is to build models that can accurately detect cyberbullying at early stages to help reduce its negative impacts.
International Forum of Educational Technology & SocietyMid.docxLaticiaGrissomzz
International Forum of Educational Technology & Society
Middle School Students’ Social Media Use
Author(s): Florence Martin, Chuang Wang, Teresa Petty, Weichao Wang and Patti Wilkins
Source: Journal of Educational Technology & Society , Vol. 21, No. 1 (January 2018), pp.
213-224
Published by: International Forum of Educational Technology & Society
Stable URL: https://www.jstor.org/stable/10.2307/26273881
REFERENCES
Linked references are available on JSTOR for this article:
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-
reference#references_tab_contents
You may need to log in to JSTOR to access the linked references.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
International Forum of Educational Technology & Society is collaborating with JSTOR to digitize,
preserve and extend access to Journal of Educational Technology & Society
This content downloaded from
������������130.160.24.117 on Mon, 26 Aug 2019 01:28:12 UTC�������������
All use subject to https://about.jstor.org/terms
https://www.jstor.org/stable/10.2307/26273881
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-reference#references_tab_contents
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-reference#references_tab_contents
Martin, F., Wang, C., Petty, T., Wang, W., & Wilkins, P. (2018). Middle School Students’ Social Media Use. Educational
Technology & Society, 21 (1), 213–224.
213
ISSN 1436-4522 (online) and 1176-3647 (print). This article of the Journal of Educational Technology & Society is available under Creative Commons CC-BY-ND-NC
3.0 license (https://creativecommons.org/licenses/by-nc-nd/3.0/). For further queries, please contact Journal Editors at [email protected]
Middle School Students’ Social Media Use
Florence Martin*, Chuang Wang, Teresa Petty, Weichao Wang and Patti Wilkins
University of North Carolina Charlotte, Charlotte, NC, USA // [email protected] //
[email protected] // [email protected] // [email protected] // [email protected]
*Corresponding author
ABSTRACT
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics
that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and
“bring your own technology” initiatives, attention to these topics is becoming increasingly important. A
total of 593 middle school students were surveyed about digital footprints and concerns about social media.
The results show that 17% started using social media at age nine or yo.
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsLori Mitchell
This research paper examines cyber bullying among undergraduate students in Bhavnagar district, India. The study used a survey to collect data from 360 undergraduate students across different colleges in the district. Results showed that male respondents reported more cyber bullying than females. Students who used electronic devices for over 4 hours per day reported more cyber bullying than those using devices 1-4 hours daily. Students in the B.A. education stream reported the highest levels of cyber bullying. The paper reviews previous literature on cyber bullying among university and college students. Studies showed cyber bullying negatively impacts victims' mental health, school performance and self-esteem. More research is needed to understand and address this issue.
it expresses youths must follow the etiquette of social media, even facebook and twitter can disturbs the studies that can be healed by online counselling
-Identify the uses for mobile devices and the implications it has in today’s classrooms.
-Discover sites, tools, apps and resources
-What critical 21st century skills can be mastered when using mobile devices?
A Semantic Web-Based Approach For Enhancing Oral History Management SystemsScott Donald
This document summarizes a study on the internet usage behaviors of young teenagers in Malaysia. The study surveyed 297 Malaysian teenagers aged 11-12 to identify their preferred types of online information, activities, and topics of interest. The study found that while young teenagers prefer entertainment information and non-serious topics, they also frequently search educational information and engage in online activities. The study aims to increase awareness of internet usage among young people in Malaysia.
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
This document reports on a survey and educational seminar about social media usage and cybercrime awareness among youth in government colleges in India. The survey found that most students use social media frequently but have little knowledge about cyber threats. It also found that students spend most evenings on social media and it negatively impacts their studies. However, most wanted to learn about cybercrime. To address this, researchers conducted an educational seminar on cybercrime trends, detection and legal issues. The seminar aimed to provide necessary information on cyber safety to students since many have smartphones and internet access but lack awareness of associated risks.
Naughty or nice: Ethical concerns for technologyJohan Koren
This document discusses various ethics issues related to technology use. It addresses ethics definitions and codes from several professional fields including education, libraries, and digital citizenship. Specific issues covered include internet filtering, copyright and fair use, plagiarism, cyberbullying, and internet safety. Resources from the federal government and Kentucky are provided on topics like protecting personal information, making social media more private, and internet safety organizations. The challenges of teaching all these ethical technology topics to students are also acknowledged.
This study examined internet abuse among Turkish teenagers and its relationship to internet usage patterns and demographics. The researchers collected data via questionnaire from 1380 high school students. They found that a small portion were considered internet abusers experiencing severe problems, while one fourth experienced occasional problems. Excessive use, tolerance, preoccupation, and using the internet to escape negative feelings were the most common symptoms of disturbed online behavior. Internet abuse differed based on gender, perceived academic achievement, frequency of use, place of use, and purpose of use, but not socioeconomic status or type of school.
Running head: FINAL PAPER 1
FINAL PAPER 11
Final Paper
Laura Dunkerson
South University Online
8/24/13
Cyber Bullying
Cyber bullying do your sources use one word or two for this term? Take another look. is one of the current social problems that have flourished with the advancement in technology because many people have access to technology today repetitive of “current”. The technology has gone to both good and bad hands. In bad hands, technology has been used to orchestrate various criminal activities. Among the criminal activities facilitated by the technology is cyber bullying. Various studies have been conducted on cyber bullying. This paper highlights some of the arguments in these studies. Despite being an activity that came with the advancement in technology, cyber bullying has rapidly spread in the society and can now affect anybody wherever he or she is if he or she is accessible to the internet. Thesis? What will the essay argue?
A research V conducted by a Harford County Examiner revealed that half the population of teenagers is word form victims of cyber bullying and only 10% of the victims take a step to report the matter to their parents. Among the cyber bullying incidents, less than 20% of the incidents get reported to the law enforcement agencies. Approximately 20% of teenagers have photos of them taken while in embarrassing situations. It further revealed that girls are V often involved in cyber bullying than boys. The study therefore indicates that cyber bullying is V common in teenagers than any other age group. It further shows how parents distance themselves towards monitoring what their teenage children do on the internet how does it show that? The evidence about from the source don’t show that. Therefore, it can be concluded that inadequate parental consent is a major contributor to the high trends of cyber bullying (Thaxter, 2010). The information in this paragraph doesn’t support this conclusion.
In regard to this, Thaxter (2010) researched and wrote a journal article titled “Cyber bullying: Challenges and strategies faced by juvenile police officers.” In this article, the author claims that juvenile police officers are expected by the government to ensure the full enforcement of laws and regulations related to cyber bullying in a school classroom setting. This makes the officers to be outstanding educational reserve this sentence doesn’t make sense. This move what move? by the police officers is centered towards the consequences of cyber bullying on the victims and also impacts that the school cyber bullying has on the behavior on the environment and ambiance at the school. A vital technique to link the differing levels of involvement in bullying is by calling attention to all stu ...
This document discusses various ethical concerns related to technology use. It begins by defining ethics as standards of right and wrong that guide human behavior and the study of developing ethical standards. It then addresses ethics in education, technology, libraries, and for digital citizens. Key topics covered include intellectual freedom, privacy, copyright, plagiarism, cyberbullying, internet filtering, and defining objectionable online materials. The document provides examples of ethics codes from the education and library fields to guide appropriate technology use and digital citizenship.
This document discusses various ethical concerns related to technology use. It begins by defining ethics as standards of right and wrong that guide human behavior. It then examines ethics in education, technology, libraries and for digital learners. Key topics covered include intellectual freedom, privacy, plagiarism, copyright, cyberbullying, internet filtering and acceptable use policies. Guidelines are provided around defining objectionable content, using intellectual property, and communication misuse. The role of teachers and librarians in promoting ethical and responsible technology use is also addressed.
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONClaire Webber
This document reviews cyberbullying and cyber threats in education. It discusses how cyberbullying involves using information and communication technologies like the internet and mobile devices to harass others. The literature review covers cybercrime and cyber threats, defining cyberbullying and examining research on the relationship between traditional bullying and cyberbullying. Studies show cyberbullying can negatively impact students similarly to traditional bullying. The increasing prevalence of technology in children's lives means digital interaction is a primary way they communicate, making cyberbullying an important issue to address.
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2Claire Webber
This document reviews cyberbullying and cyber threats in education. It discusses how cyberbullying involves using information and communication technologies like the internet and mobile devices to harass others. The literature review covers topics like cybercrime, cyber threats, how cyberbullying compares to traditional bullying, and the impacts of cyberbullying on students. It examines several research studies and articles that discuss the prevalence of cyberbullying, legal issues surrounding it, and challenges in preventing technological forms of bullying as new technologies emerge.
A review of cyberbullying and cyber threats in education 2IAEME Publication
This document reviews cyberbullying and cyber threats in education. It discusses how cyberbullying involves using information and communication technologies like the internet and mobile devices to harass others. The literature review covers topics like cybercrime, cyber threats, how cyberbullying compares to traditional bullying, and its impacts on students. Studies show cyberbullying has negative effects similar to traditional bullying and is a growing concern that needs more focus in education. The document examines several research papers and articles on the prevalence of cyberbullying, prevention strategies, and challenges in addressing new technologies.
Prevalence and influence of cyberbullying behaviour on self esteem and body i...MohinderSingh78
This document summarizes a research article that examines the prevalence and influence of cyberbullying behavior on self-esteem and body image among adolescents. It finds that cyberbullying is a widespread and growing problem affecting 20-40% of youth. Studies show cyberbullying is associated with negative consequences like lower self-esteem, depression, feelings of powerlessness, and academic difficulties. The rapid rise of internet and smartphone use among adolescents has increased their risk of being both victims and perpetrators of cyberbullying.
Online classes during the COVID-19 lockdown have been hindered by poor internet connectivity for many students in India, according to an ongoing study by Dr. Michelle Philip. The study has found that some students have to walk to areas with better reception to participate in their online classes. The research also uncovered multiple other challenges facing students and the transition to remote learning during the pandemic lockdown.
9th International Conference on Gender & Women's Studies 2022- NUSS, Singapore
"Achieving Gender Equality and Women Empowerment in Post Pandemic Situations A Case Study of an NGO in India"
It ethics undergraduates’ perception based on their awarenessAlexander Decker
This document discusses a study that explored undergraduate students' perceptions of ethical information technology use based on their awareness. The study surveyed 542 students from 4 universities in Pakistan about various computer and internet activities, asking them to label each as right, wrong, or neither. The results found that many students lacked prior training in computer ethics and had little knowledge about the topic. Female students, those from public universities, computing/IT departments, and science disciplines generally had more positive views of ethical IT use. Minimal differences were seen based on prior IT training or ethics knowledge. This suggests computer ethics training is needed for all university students.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
A Review Paper On Cyber Harassment Detection Using Machine Learning Algorithm...Lisa Muthukumar
The document presents a review of using machine learning algorithms to detect cyber harassment on social networking websites. It discusses past research on cyberbullying detection and proposes a system to train models on Twitter and Wikipedia datasets to classify text as containing cyberbullying or not, using natural language processing and support vector machines. The goal is to build models that can accurately detect cyberbullying at early stages to help reduce its negative impacts.
International Forum of Educational Technology & SocietyMid.docxLaticiaGrissomzz
International Forum of Educational Technology & Society
Middle School Students’ Social Media Use
Author(s): Florence Martin, Chuang Wang, Teresa Petty, Weichao Wang and Patti Wilkins
Source: Journal of Educational Technology & Society , Vol. 21, No. 1 (January 2018), pp.
213-224
Published by: International Forum of Educational Technology & Society
Stable URL: https://www.jstor.org/stable/10.2307/26273881
REFERENCES
Linked references are available on JSTOR for this article:
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-
reference#references_tab_contents
You may need to log in to JSTOR to access the linked references.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
International Forum of Educational Technology & Society is collaborating with JSTOR to digitize,
preserve and extend access to Journal of Educational Technology & Society
This content downloaded from
������������130.160.24.117 on Mon, 26 Aug 2019 01:28:12 UTC�������������
All use subject to https://about.jstor.org/terms
https://www.jstor.org/stable/10.2307/26273881
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-reference#references_tab_contents
https://www.jstor.org/stable/10.2307/26273881?seq=1&cid=pdf-reference#references_tab_contents
Martin, F., Wang, C., Petty, T., Wang, W., & Wilkins, P. (2018). Middle School Students’ Social Media Use. Educational
Technology & Society, 21 (1), 213–224.
213
ISSN 1436-4522 (online) and 1176-3647 (print). This article of the Journal of Educational Technology & Society is available under Creative Commons CC-BY-ND-NC
3.0 license (https://creativecommons.org/licenses/by-nc-nd/3.0/). For further queries, please contact Journal Editors at [email protected]
Middle School Students’ Social Media Use
Florence Martin*, Chuang Wang, Teresa Petty, Weichao Wang and Patti Wilkins
University of North Carolina Charlotte, Charlotte, NC, USA // [email protected] //
[email protected] // [email protected] // [email protected] // [email protected]
*Corresponding author
ABSTRACT
Cyber bullying, digital identity, impact of digital footprints, and use of inappropriate social media are topics
that are gaining attention in K-12 schools. As more schools and school districts are implementing 1-1 and
“bring your own technology” initiatives, attention to these topics is becoming increasingly important. A
total of 593 middle school students were surveyed about digital footprints and concerns about social media.
The results show that 17% started using social media at age nine or yo.
A Comparative Study Of Cyber Bullying Among Undergraduate StudentsLori Mitchell
This research paper examines cyber bullying among undergraduate students in Bhavnagar district, India. The study used a survey to collect data from 360 undergraduate students across different colleges in the district. Results showed that male respondents reported more cyber bullying than females. Students who used electronic devices for over 4 hours per day reported more cyber bullying than those using devices 1-4 hours daily. Students in the B.A. education stream reported the highest levels of cyber bullying. The paper reviews previous literature on cyber bullying among university and college students. Studies showed cyber bullying negatively impacts victims' mental health, school performance and self-esteem. More research is needed to understand and address this issue.
it expresses youths must follow the etiquette of social media, even facebook and twitter can disturbs the studies that can be healed by online counselling
-Identify the uses for mobile devices and the implications it has in today’s classrooms.
-Discover sites, tools, apps and resources
-What critical 21st century skills can be mastered when using mobile devices?
A Semantic Web-Based Approach For Enhancing Oral History Management SystemsScott Donald
This document summarizes a study on the internet usage behaviors of young teenagers in Malaysia. The study surveyed 297 Malaysian teenagers aged 11-12 to identify their preferred types of online information, activities, and topics of interest. The study found that while young teenagers prefer entertainment information and non-serious topics, they also frequently search educational information and engage in online activities. The study aims to increase awareness of internet usage among young people in Malaysia.
IRJET- A Survey on Social Networking and Awareness About Related Cyber Threat...IRJET Journal
This document reports on a survey and educational seminar about social media usage and cybercrime awareness among youth in government colleges in India. The survey found that most students use social media frequently but have little knowledge about cyber threats. It also found that students spend most evenings on social media and it negatively impacts their studies. However, most wanted to learn about cybercrime. To address this, researchers conducted an educational seminar on cybercrime trends, detection and legal issues. The seminar aimed to provide necessary information on cyber safety to students since many have smartphones and internet access but lack awareness of associated risks.
Naughty or nice: Ethical concerns for technologyJohan Koren
This document discusses various ethics issues related to technology use. It addresses ethics definitions and codes from several professional fields including education, libraries, and digital citizenship. Specific issues covered include internet filtering, copyright and fair use, plagiarism, cyberbullying, and internet safety. Resources from the federal government and Kentucky are provided on topics like protecting personal information, making social media more private, and internet safety organizations. The challenges of teaching all these ethical technology topics to students are also acknowledged.
This study examined internet abuse among Turkish teenagers and its relationship to internet usage patterns and demographics. The researchers collected data via questionnaire from 1380 high school students. They found that a small portion were considered internet abusers experiencing severe problems, while one fourth experienced occasional problems. Excessive use, tolerance, preoccupation, and using the internet to escape negative feelings were the most common symptoms of disturbed online behavior. Internet abuse differed based on gender, perceived academic achievement, frequency of use, place of use, and purpose of use, but not socioeconomic status or type of school.
Running head: FINAL PAPER 1
FINAL PAPER 11
Final Paper
Laura Dunkerson
South University Online
8/24/13
Cyber Bullying
Cyber bullying do your sources use one word or two for this term? Take another look. is one of the current social problems that have flourished with the advancement in technology because many people have access to technology today repetitive of “current”. The technology has gone to both good and bad hands. In bad hands, technology has been used to orchestrate various criminal activities. Among the criminal activities facilitated by the technology is cyber bullying. Various studies have been conducted on cyber bullying. This paper highlights some of the arguments in these studies. Despite being an activity that came with the advancement in technology, cyber bullying has rapidly spread in the society and can now affect anybody wherever he or she is if he or she is accessible to the internet. Thesis? What will the essay argue?
A research V conducted by a Harford County Examiner revealed that half the population of teenagers is word form victims of cyber bullying and only 10% of the victims take a step to report the matter to their parents. Among the cyber bullying incidents, less than 20% of the incidents get reported to the law enforcement agencies. Approximately 20% of teenagers have photos of them taken while in embarrassing situations. It further revealed that girls are V often involved in cyber bullying than boys. The study therefore indicates that cyber bullying is V common in teenagers than any other age group. It further shows how parents distance themselves towards monitoring what their teenage children do on the internet how does it show that? The evidence about from the source don’t show that. Therefore, it can be concluded that inadequate parental consent is a major contributor to the high trends of cyber bullying (Thaxter, 2010). The information in this paragraph doesn’t support this conclusion.
In regard to this, Thaxter (2010) researched and wrote a journal article titled “Cyber bullying: Challenges and strategies faced by juvenile police officers.” In this article, the author claims that juvenile police officers are expected by the government to ensure the full enforcement of laws and regulations related to cyber bullying in a school classroom setting. This makes the officers to be outstanding educational reserve this sentence doesn’t make sense. This move what move? by the police officers is centered towards the consequences of cyber bullying on the victims and also impacts that the school cyber bullying has on the behavior on the environment and ambiance at the school. A vital technique to link the differing levels of involvement in bullying is by calling attention to all stu ...
This document discusses various ethical concerns related to technology use. It begins by defining ethics as standards of right and wrong that guide human behavior and the study of developing ethical standards. It then addresses ethics in education, technology, libraries, and for digital citizens. Key topics covered include intellectual freedom, privacy, copyright, plagiarism, cyberbullying, internet filtering, and defining objectionable online materials. The document provides examples of ethics codes from the education and library fields to guide appropriate technology use and digital citizenship.
This document discusses various ethical concerns related to technology use. It begins by defining ethics as standards of right and wrong that guide human behavior. It then examines ethics in education, technology, libraries and for digital learners. Key topics covered include intellectual freedom, privacy, plagiarism, copyright, cyberbullying, internet filtering and acceptable use policies. Guidelines are provided around defining objectionable content, using intellectual property, and communication misuse. The role of teachers and librarians in promoting ethical and responsible technology use is also addressed.
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATIONClaire Webber
This document reviews cyberbullying and cyber threats in education. It discusses how cyberbullying involves using information and communication technologies like the internet and mobile devices to harass others. The literature review covers cybercrime and cyber threats, defining cyberbullying and examining research on the relationship between traditional bullying and cyberbullying. Studies show cyberbullying can negatively impact students similarly to traditional bullying. The increasing prevalence of technology in children's lives means digital interaction is a primary way they communicate, making cyberbullying an important issue to address.
A REVIEW OF CYBERBULLYING AND CYBER THREATS IN EDUCATION 2Claire Webber
This document reviews cyberbullying and cyber threats in education. It discusses how cyberbullying involves using information and communication technologies like the internet and mobile devices to harass others. The literature review covers topics like cybercrime, cyber threats, how cyberbullying compares to traditional bullying, and the impacts of cyberbullying on students. It examines several research studies and articles that discuss the prevalence of cyberbullying, legal issues surrounding it, and challenges in preventing technological forms of bullying as new technologies emerge.
A review of cyberbullying and cyber threats in education 2IAEME Publication
This document reviews cyberbullying and cyber threats in education. It discusses how cyberbullying involves using information and communication technologies like the internet and mobile devices to harass others. The literature review covers topics like cybercrime, cyber threats, how cyberbullying compares to traditional bullying, and its impacts on students. Studies show cyberbullying has negative effects similar to traditional bullying and is a growing concern that needs more focus in education. The document examines several research papers and articles on the prevalence of cyberbullying, prevention strategies, and challenges in addressing new technologies.
Prevalence and influence of cyberbullying behaviour on self esteem and body i...MohinderSingh78
This document summarizes a research article that examines the prevalence and influence of cyberbullying behavior on self-esteem and body image among adolescents. It finds that cyberbullying is a widespread and growing problem affecting 20-40% of youth. Studies show cyberbullying is associated with negative consequences like lower self-esteem, depression, feelings of powerlessness, and academic difficulties. The rapid rise of internet and smartphone use among adolescents has increased their risk of being both victims and perpetrators of cyberbullying.
Online classes during the COVID-19 lockdown have been hindered by poor internet connectivity for many students in India, according to an ongoing study by Dr. Michelle Philip. The study has found that some students have to walk to areas with better reception to participate in their online classes. The research also uncovered multiple other challenges facing students and the transition to remote learning during the pandemic lockdown.
9th International Conference on Gender & Women's Studies 2022- NUSS, Singapore
"Achieving Gender Equality and Women Empowerment in Post Pandemic Situations A Case Study of an NGO in India"
This document summarizes a study that examined the relationship between students' internet self-efficacy and their grades when using social media as a learning tool. The study hypothesized that students with high internet self-efficacy would earn higher overall grades. It involved surveying 40 undergraduate students about their internet self-efficacy and analyzing their course grades. Regression analysis found a positive correlation between self-efficacy scores and grades. Students with higher self-efficacy tended to earn higher grades, supporting the hypothesis.
This document discusses teacher education and teaching practice in Nigeria. It begins by outlining the importance of education and the establishment of colleges of education to provide professional training for teachers. Teaching practice is described as an integral part of teacher education programs aimed at preparing new teachers. The document then discusses challenges with teaching practice in Nigeria and quality issues in public and private secondary schools. It concludes by recommending improvements to teaching practice, including longer durations and exposure to micro-teaching beforehand, to better prepare student teachers.
1) The Triple Talaq Bill aims to criminalize the practice of instant triple talaq among Muslims but the author argues it has a communal agenda of bringing in a Uniform Civil Code.
2) Existing laws like the Protection of Women from Domestic Violence Act 2005 already protect women's rights and there is no need for a separate law only for Muslim women.
3) Imposing criminal liability for uttering talaq thrice is illogical as the Supreme Court has already ruled it does not dissolve the marriage, and it could further marginalize Muslim women.
This document summarizes a presentation on the negative consequences of austerity policies through public expenditure cuts. The presentation discusses how austerity aims to reduce debt and deficits through lower spending and higher taxes. However, evidence from several European countries shows that austerity had unintended consequences like harming healthcare systems, increasing health inequalities, damaging work-life balance, and reducing life expectancy. The conclusion proposes setting reasonable constitutional limits on expenditures and minimum levels for key investments and services to prevent disproportionate austerity measures from causing further social issues.
This study examined how cultural dynamics influence perceptions of workplace bullying among managerial employees in Sri Lanka. A survey was administered to 230 managers in the fast-moving consumer goods industry. The findings showed that person-related bullying, such as ignoring and insulting colleagues, was more prevalent than work-related bullying behaviors. Additionally, some behaviors considered bullying in Western contexts, such as off-hand remarks and jokes, were viewed as normal occurrences. The study suggests that what constitutes bullying may differ across cultures. The results contribute to conceptualizing workplace bullying in Asian cultures and can help organizations design interventions to promote healthy and just work environments.
1) The document discusses the management of internally displaced persons (IDPs) in Yobe State, northeastern Nigeria following conflict with Boko Haram.
2) It examines factors influencing where IDPs settle, how host communities view and relate to IDPs, and the effects of increased population on common resources.
3) Through qualitative interviews, focus groups, and observations, the research finds that while hosts initially accepted and sympathized with IDPs, relations have transformed to rejection and hostility, in part due to overuse of resources and disputes over access to lands and water.
This document discusses the importance of intentional succession planning in higher education institutions. It notes that while common in corporations, succession planning is not widely practiced in universities. The document advocates for a more formal and systematic approach to succession planning at universities, including early identification of leadership potential, providing leadership development opportunities, and linking succession planning to strategic planning. Some specific best practices from corporations discussed include mentoring programs, project leadership roles to gain experience, and considering research, teaching, and administrative career paths.
This document summarizes a study on legal protections for victims of domestic violence in Peru. The study aimed to assess whether Peruvian laws sufficiently address violence against women and are efficiently implemented. Through interviews and data analysis, the study found that while Peruvian laws do sufficiently address the issue, implementation is inefficient due to lack of resources. For example, laws mandate support services for victims but services are underfunded and inaccessible in some areas. The case study also examines factors that make women in Ayacucho especially vulnerable to violence. In conclusion, more resources are needed to properly enact existing laws and protect women across Peru.
The document discusses integrated solid waste management for sustainable development in Kalmunai Municipality. It introduces integrated solid waste management and sustainable development. It discusses the relationship between the two concepts and notes that proper waste management is key to environmental sustainability. The study aims to assess the significance of integrated solid waste management for sustainable development in the municipality, which currently struggles without a proper landfill and has not achieved recycling targets. The methodology, data analysis, recommendations are also summarized.
This study analyzes land cover changes in Kadawatha Sub Urban area in Sri Lanka between 1989 and 2016 to examine urban sprawl. Spatial analysis of land use digital data found that home gardens increased, especially beyond 1km from the urban core, as people established residences further out. Other agricultural lands like rubber and coconut declined significantly as land was converted to residential use. Paddy lands were largely abandoned. Overall, Kadawatha has developed ideal suburban characteristics over the past 30 years, with non-agricultural uses expanding into peripheral areas and more commercial development concentrated within 1km of the urban center. Urban sprawl can be understood from the increase in housing beyond the initial 1km buffer zone.
Health and environmental consciousness, common attributes of organic foods, and market availability are key determinants of Sri Lankan consumers' purchase intention of organic foods. A survey of 144 organic food consumers in 6 Sri Lankan cities found that over half were female aged 31-45. While consumers were aware of organic foods' values, lack of availability was a constraint. Improving awareness, accessibility, and certification could help stimulate demand. Policymakers should promote health benefits and support farmers to increase organic production and market conditions.
This study quantified the role of seed contamination as a source of weedy rice infestation and spread in four provinces in Sri Lanka. Seed samples were collected from farmers in these provinces and tested for weedy rice contamination. The results showed that the majority of farmers used their own seed or seeds from neighboring farmers, which were contaminated with 19-73% weedy rice seeds. This means farmers were seeding 46,000 to 60,000 weedy rice seeds per hectare. The study concluded that contaminated seed paddy is a main source of weedy rice infestation and spread in the studied areas due to farmers' lack of awareness about weedy rice and use of certified seeds.
This document summarizes a study that investigated decorating titanium dioxide nanoparticles with carbon dots derived from table sugar to enhance their photocatalytic activity. The carbon dots were synthesized through a hydrothermal method and showed good absorption and photoluminescence properties. A composite material of carbon dot-decorated titanium dioxide was prepared and showed increased photocatalytic degradation of methylene blue dye under visible light compared to bare titanium dioxide, demonstrating the potential of this novel approach for greener photocatalysis utilizing visible light.
This document summarizes a research study about the lived experiences of cancer patients. It discusses the purpose and significance of studying this topic for nursing practice, education, and the profession. The study used qualitative phenomenology methodology to interview 8 cancer patients about their perceptions and coping mechanisms. Key findings included feelings of fear, pain, family impacts like financial burden, and personal changes. Patients found motivation to continue treatment through faith, family support, and dreams of recovery. The summary recommends that nursing practice be sensitive to patients, education incorporate these findings, and the profession strengthen oncology specialization and partnerships.
The document examines definitions of children from global and Bangladeshi perspectives. It discusses how children are defined biologically and socially, as well as how the definition is changing. The Bangladesh government approved a new National Child Policy to address challenges like different age limits set in laws. The policy aims to redefine a child as under 18 and keep children out of the workforce. While changing definitions presents challenges, partnerships like one between Telenor and UNICEF show promise in helping children in Bangladesh.
1) The document discusses a study on incorporating visible light activated titanium dioxide (TiO2) nanoparticles into denture base resin to improve oral health.
2) In vitro tests found that denture base resin containing 3-5% TiO2 nanoparticles exposed to visible light significantly reduced colony forming units of common oral pathogens over time.
3) Preliminary in vivo tests also saw reduced bacterial plaque buildup on dentures containing TiO2 after 6 months of use, suggesting the nanoparticles maintain antimicrobial activity long-term.
This document discusses a study evaluating osteoblastic activity on zirconia discs with different surface treatments. It is divided into three groups: Group I (no surface treatment), Group II (sandblasting and acid etching), and Group III (UV radiation). SEM analysis found Group I had few parallel lines and pits/cracks, Group II had a porous surface with prominent changes, and Group III had lines/pits/cracks. Results showed Group I had few osteoblastic cell colonies, Group II had more colonies, and Group III had the maximum number of colonies. The conclusion was that UV photofunctionalization (Group III) promoted the best osteoblast adhesion and activity compared to the other groups.
More from International Center for Research & Development (20)
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Main Java[All of the Base Concepts}.docxadhitya5119
This is part 1 of my Java Learning Journey. This Contains Custom methods, classes, constructors, packages, multithreading , try- catch block, finally block and more.
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxEduSkills OECD
Iván Bornacelly, Policy Analyst at the OECD Centre for Skills, OECD, presents at the webinar 'Tackling job market gaps with a skills-first approach' on 12 June 2024
2. INTRODUCTION
• Information communication technology to expand access to education.
Through ICT learning can occur anytime and anywhere. Varied researchers
have noted that ICT has become an integral and customary part of students’
everyday life.
• Lau and Au (2002) explored that 89% student’s use computer for doing
homework.
• Ogur (2004) surveyed that 91.1% students use internet, 69.5%use computer
for watching different videos, 70.5% for listing different kind of music
and81.6% use email for communication with peers.
• Uribe and Marino (2006) found that students who had access to a
computers 64%, search engines is 88.3%, and email use is 92.2% and
about 21% student use internet for their studies.
• Gay (2006) found that 92% students use computer for writing their work,
72% for doing their studies, and 95% for emailing for communication with
teachers.
• Inoue (2007) explored that college students attitude toward using ICT in
education was very positive.
• Ghabili and Alizadeh (2008) found that approximately 45% students use
computers and internet for connecting with peers.
3. • The modern scenario is particularly marked by the misuse of
technology in various forms and scales. The misuse of
technology at global level is very alarming. It is a biggest
threat to mankind by mankind themselves. Its implication on
our values, ethics, cultures, civilization, humanity and peace is
destructive and immoral. The misuse of technology has to be
brought to light, its implications have to be made aware in the
society, corrective measures need to be suggested and
practiced for the creation of better tomorrow. Some of the
problems which have emerged due to non-adherence of ethics
and values for the use of ICT are:
4. Cyber Crime:- Cybercrime is a crime in which a computer is the object of the crime.
Cyber criminals may use computer technology to access personal information, secrets
and use the internet for exploitive of malicious purposes.
• Mahajan (2015) found that (53.5%) rise cases in the cyber crime. 324 peoples have
arrested under the information technology act, 215 from the age 18-30 years. The cause
of increasing cyber crime among youth is earning money in easy ways. Peer pressure
also plays a negative role which leads youths to earn money in easy ways that increase
cyber crime.
• According to PIT (2015) national crime records bureau studied in 2014, 143 people
arrested for cyber crime below age of 18-30. Types of cyber crime included cyber
defamation, email hacking, mobiles crime, cyber stalking and data theft.
• Home Affairs and Enforcement (2015) found that in India 5693 total cases had been
registered under crime in the year 2013. The fifteen Indian states Uttar Pradesh,
Maharashtra, Kerala, Andhra Pradesh, West Bengal, Madhya Pradesh, Punjab, Haryana,
Rajasthan, Bihar, Assam, Orissa, Delhi and Chhattisgarh in terms of the maximum
number of cyber crime cases registered in 2013.
• Barton (2016) Identity theft is one of the fastest growing crimes against consumers, and
it can affect anyone, including college students. College students are especially
vulnerable because many do not understand the importance of keeping their personal
information and documents safe. According to the U.S. Federal Trade Commission
(FTC), 29 percent of identity theft victims are between the ages of 18 and 29. Young
adults are a prime target for identity thieves because they are likely to have a clean credit
report and are less likely to monitor their credit history on a regular basis.
5. Account and Data Hacking:- Hacking means hack bank accounts,
passwords, emails and personal information of individuals from social sites
by the criminals.
• LinkedIn (2012) is very popular social networking site for used
professionals. Recently came under Russia hackers who publicized the
passwords of more than 6.5 million user’s accounts.
• IBN Live (2013) explored that Delhi Police arrested two people for
allegedly swindling 70lakh from the bank account. The police seized that
three laptops from them containing banking data of around 1.5 crore
people.
• Express New Service (2016) found that cyber crime police bengaluru
arrested seven people including an Axis Bank deputy Manager for
allegedly hacking into peoples bank accounts using mobile banking apps
and stealing people’s money.
6. Plagiarism: It’s an act of stealing and using others intellectual properties
and academic works as one’s own. It includes illegally copying and using
of academic write-ups, stories, books, songs, poems etc.
• Gilmore (2010), explored that (42.2%) of research proposals by technology,
science, mathematics and engineering graduate students have contained
plagiarism.
• University News (2012) surveyed 60 undergraduate and postgraduate
business students with different scenarios around an impending assignment.
The results showed that whether the last minute rush to compete an essay
was expected or unexpected influenced the students committing plagiarism.
• Vieyra (2013) conducted a study that (47%) of English Additional
Language graduate students had plagiarized in their research proposals.
Identity theft: Several criminals have impersonated themselves as
important officials and used the advantage of the situation to steal money
from innocent people.
• Harrell and Langton (2013) found that approximately 16.6 million person
and 7% of all U.S residents age of 16 or older were victim of one or more
time identity theft in year 2012. They also found that in identity theft victim
existing bank 37% of credit card misuse information.
7. Copyright Infringement: The boom of electronic devices has led
to illegal and mass production of books, audios and video CDs.
• Konstantakis (2005) surveyed 79 students of a Computer Science
Department and it was found that all students illegitimately use or
copy software that is protected by intellectual property rights.
Pirated Software: There are many system software and application
software in market which are not genuine but pirated by group of
people to make quick bucks.
• Christensen and Eining (1991) investigated unethical copying of
software among accounting students and results was found that
(73%) of students self-reported that they have engaging in software
piracy and students' knowledge of the laws appeared to have little
impact on piracy behavior.
• Wood and Glass (1995) studied that females student were less likely
to allow another students to make an illegal copy of commercial
software than males students were more.
8. Academic Dishonesty: Academic dishonesty or academic miscount is any
type of cheating that occurs in relation to formal academic exercise. It can
included plagiarism, deception and sabotage.
• McCabe (1997), surveyed that 16 schools with engineering and science
programs and it was found that (84%) of business students have self
reported that they admitted to serious in cheating their past years.
• Morales (2000), found that (68%) of college students have self reported
that they had engaged in academic dishonesty behavior in classroom.
• Brown, Weible and Olmosk (2010) found that (49%) of undergraduate
students had admitted in cheating in their classroom.
Cyber bullying: Cyberbullying means the use of mobiles phones,
messaging, emails, chat rooms and social networking sites as Facebook and
Twitter to harass, threaten and intimidate someone.
• Dilmac (2009) surveyed 666 students and researcher found that (22%)
students self reported that they experiencing in Cyberbullying.
• Walker Sockman and Koeln (2011) explored that (11%) of college students
had experienced Cyberbullying and about (40%) of students knowing
someone who had been Cyber bullied.
9. Internet addiction:- Internet addiction is described as an impulse control
disorder, which does not involve use of an intoxicating drug and is very
similar to pathological gambling. Some Internet users may develop an
emotional attachment to on-line friends and activities they create on their
computer screens.
• Goel, Subramanyam and Kamath (2013) surveyed that 987 adolescents and
researchers found that use of internet addiction had high scores on
depression, anxiety among adolescents.
• Cardak (2013) surveyed 479 university students among internet addiction
and psychological well-being. Results indicate that students have higher
levels of internet addiction are more likely to be low in psychological well-
being.
10. • The erosion of ethical values in our society today has become a
phenomenon. There is a maddening pursuit to accumulate wealth, power
and status to the total exclusion of humanness in us. In the society of the
future that is emerging and whose frontiers remain largely unknown, it is
not possible, to provide a package of values to the student for use in his
later life. Unlike in the past, the degree of confrontational and conflictual
situations has largely increased. There is marked erosion of personal
freedom, brought about by mass hysteria induced by the powerful
Information and Communication Technology (ICT). To maintain one's
selfhood and identity; to find the resources to make personal choices and
decisions has become one of the major problems. This is also the
educational problem. Whether we deal with this crisis as a source of peril
or (as the Chinese use the term crisis) as an opportunity depends on us.
This represents the agony and the ecstasy of the problem.
• Education at present, with its emphasis on ‘consumerism’ and competition
for achievement, has sidelined its central concern for the full development
of the social, moral and spiritual side of human personality. Ethical
education which needs to be looked upon as an essential aspect for the
overall qualitative improvement of education is being neglected to a great
extent.
11. TECHNOETHICS
• The word Technoethics is derived from two words
‘technology’ and ‘ethics’ which means ethics in technology.
Technoethics is concern with the ethical and morals aspect of
technology in society. It draws on methods and theories from
many knowledge domains to provide insight on ethical
dimension of technological system and practice for advancing
a technological society. Technoethics involve the ethical aspect
of technology with in a society that is shaped by technologies.
• The concept of Technoethics is not new, as far as the history
could take us back. The term technoethics was first
introducing by Philosopher Mario Bunge in 1977. It was
argued that current scientific practices and technological
progress are not guided by ethics. It was also suggested that
technologists and scientists would be morally or technically
responsible for the technology they practice or produce.
12. SCOPE OF THE STUDY
• Nowadays, college students have massive use of Information
Communication Technology (ICT), tools like mobiles, computers,
laptops, internet, Wi-Fi, email, IPods, electronic notebooks, MP3
player, text and instant messages for communication, social
networking sites including (Facebook, twitter, MySpace, viber) and
digital television. As student share spending considerable amount of
time on ICT usage, with many positive impact of ICT in education
there are also negative side of the same.
• Some serious issues regarding more involvement of students and
unethical practices in ICT usage followed by them, which were
earlier considered at embryonic stage has gotten mature stage. Issues
like lack of privacy, security, copyright infringement, cyber crime,
academic dishonesty, hacking and plagiarism are having teething
and sound effects, since all are having potential influence in eating
the ethical values of the students. If not taken earnestly there will be
severe magnitude. It is a high time to inculcate some ethical values
allied to ICT usage in the students.
13. How to stop misuse of technology
• Protecting the computers and network while using
technology is very important in college settings, for
everybody uses these tools. Everybody should be
responsible for protecting technological instruments.
Teachers should teach students careful use of equipment,
resources and facilities.
• Teachers are important elements in the education system.
Since they are responsible for the development of
students, teachers need to be aware of ethical
responsibilities. Teachers should be good role models for
students because students learn by examples. Being a
good model requires caring, compassion, sensitivity,
commitment, the pursuit of truth and respect of self and
others, honesty, trustworthiness, integrity, equality,
impartiality, fairness, and justice (Bodi, 1998).
14. • Educational organizations playing very important role to
stop misuse of technology. They should have make rules
and obligations to help students learn how to use the
technology in a responsible and safe manner. For
example, filtering is important for institutions and home
computers.
• As we can see, sometimes the technology is not logical.
Educational institutions should help students learn how to
think critically about technology issues, not what to think
about them. Teachers can help students acquire informed
attitudes about the various technologies and their social,
cultural, economic, and ecological consequences.
15. CONCLUSION
• Information communication technology is one of the most powerful and formative
forces of students life. There are many concerns and encounters among college
students related to lack of social values and unethical behavior while using internet
and technology. The social values parameters such as honesty, humanity,
cooperation, tolerance and unity are essentials to turn up the college students into
right direction for use of technology.
• The present day educational system has ignored students social values related with
technology. Articulation of personal values when using technology is very much
indispensable and vital. We must stress the deliberation and application of
principles rather than relying on a detailed set of rules, ethical behavior is to be
modeled. Accept the fact that students will make mistakes; allow students to use
Internet and reinforce social behaviors and react to the misuse of technology.
Assessment of student understanding of social values while using technology is
mandatory. Educating the students and parents about social values for the use of
ICT.
• The Children’s Internet Protection Act demands that public schools and libraries to
take steps to prevent students from accessing certain materials on cyberspace.
Create such environments that will help students to avoid temptations. Our prime
responsibility is to inculcate ethical and social values among students, so that they
can use ICT in constructive manner. Parents, teachers and educational institutions
can play very important role for inculcation of social values while using ICT. The
one of most effective method for inculcating social values related to technology is
self education. The best way for inculcating social values in students are to teach
them regarding the various technological issues of present time so that varied
technologies can be used for constructive ways.
16. • The Children’s Internet Protection Act demands that public schools and
libraries to take steps to prevent students from accessing certain materials
on cyberspace. Create such environments that will help students to avoid
temptations.
• Our prime responsibility is to inculcate ethical and social values among
students, so that they can use ICT in constructive manner. Parents, teachers
and educational institutions can play very important role for inculcation of
social values while using ICT. The one of most effective method for
inculcating social values related to technology is self education.
• The best way for inculcating social values in students are to teach them
regarding the various technological issues of present time so that varied
technologies can be used for constructive ways.