CFP last date
20 January 2025
Reseach Article

Early Security Adopters

by Marcelo Carvalho
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 72 - Number 4
Year of Publication: 2013
Authors: Marcelo Carvalho
10.5120/12486-8956

Marcelo Carvalho . Early Security Adopters. International Journal of Computer Applications. 72, 4 ( June 2013), 45-49. DOI=10.5120/12486-8956

@article{ 10.5120/12486-8956,
author = { Marcelo Carvalho },
title = { Early Security Adopters },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 72 },
number = { 4 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 45-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume72/number4/12486-8956/ },
doi = { 10.5120/12486-8956 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:37:05.102851+05:30
%A Marcelo Carvalho
%T Early Security Adopters
%J International Journal of Computer Applications
%@ 0975-8887
%V 72
%N 4
%P 45-49
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This article discusses how security issues affects kids and teenagers in their daily use of Internet communication tools and their risk profile. Understanding their behaviour and security threats exposure is part of an ongoing state-wide project here described that delivers security awareness training and performs surveys at school classes.

References
  1. Bohrnstedt, G. Reliability and validity assessment in attitude measurement. In Gene F. Summers, Attitude measurement. 1998.
  2. Light, J. ; Yasuhara, K. Analyzing large free-response qualitative data sets — a novel quantitative-qualitative hybrid approach. Frontiers in Education Conference, 2008.
  3. George, C. P. A Machine Learning Based Topic Exploration and Categorization on Surveys, 2012.
  4. ICT Households and enterprises 2011. Survey on the use of information and communication technologies in Brazil, 2012.
  5. Hirose, M. A Private Information Detector for Controlling Circulation of Private Information through Social Networks, 2012.
  6. Senac University - http://www. sp. senac. br (last viewed 03-03-2013)
  7. Fatec Faculty - http://www. fatecsaocaetano. edu. br/ (last viewed 03-03-2013)
  8. Brazillian Institute of Advanced Technology – IBTA - www. ibta. com. br/ (last viewed 03-03-2013)
  9. IBGE – Students in school age population. http://www. todospelaeducacao. org. br/educacao-no-brasil/numeros-do-brasil/dados-por-estado/sao-paulo/ (last viewed 03-03-2013)
  10. Cyber bully attacks Minneapolis Washburn students. http://www. kare11. com/science_technology/article/991771/484/Cyber-bully-attacks-Washburn-students (last viewed 03-02-2013)
  11. Cyberbullying leads to school attack. http://www. iol. co. za/the-star/cyberbullying-leads-to-school-attack-1. 1230431#. UUInkBfvsgk (last viewed 03-02-2013)
  12. CEOP Strategic Overview 2009-2010 - http://www. ceop. police. uk/publications/ (last viewed 03-15-2013)
  13. FBI and the National Center for Missing & Exploited Children. http://www. fbi. gov/news/podcasts/inside/inside_071211. mp3/view (last viewed 03-15-2013)
  14. Schools learn hard lesson in information security protection. Infosecurity Magazine, 2011. - http://www. infosecurity-magazine. com/view/16816/schools-learn-hard-lesson-in-information-security-protection/ ( last viewed 03-13-2013)
  15. The Children's Internet Protection Act, 2001. -http://www. fcc. gov/cgb/consumerfacts/cipa. html (last viewed 03-13-2013)
  16. The Childrens Online Privacy Protection Act, 2000. - http://www. ftc. gov/bcp/conline/pubs/buspubs/coppa. htm (last viewed 03-13-2013)
  17. The Family Educational Rights and Privacy Act, 1974. - http://www2. ed. gov/policy/gen/guid/fpco/ferpa/index. html (last viewed 03-13-2013)
Index Terms

Computer Science
Information Sciences

Keywords

Security Awareness Social Internet Child Safe and Security