Page 228 - Binder2
P. 228

2030

Gratian, M., Bandi, S., Cukier, M., Dykstra, J., & Ginther, A. (2018). Correlating human traits and cyber security behavior intentions.
                   computers & security, 73, 345358.

Hao, Y., Lee, K. S., Chen, S. T., & Sim, S. C. (2018). An Evaluative Study of a Mobile Application for Middle School Students Struggling
                   with English Vocabulary Learning. Computers in Human Behavior.

Human Rights. (20 NOVEMBER, 1989). Convention on the Rights of the Child. Retrieved from UNITED NATION HUMAN RIGHTS
                   OFFICE OF THE HIGH COMMISSIONER: https://www.ohchr.org/en/professionalinterest/pages/crc.aspx

International Telecommunications Union (ITU). ITUTX.1205: series X: data networks, open system communications and security:
                   telecommunication security: overview of cybersecurity 2008.

Islam, N., Want, R., 2014. Smartphones: past, present, and future. IEEE Pervasive Comput. (4), 89–92.
ITU (2016). ICT facts and figures 2016. Geneva, Switzerland: International Telecommunications Union. Retrieved January, 2017 from

                   http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2016.pdf.
Jones, C., & Shao, B. (2011). The net generation and digital natives: implications for higher education
Kitzinger, J. (1995). Qualitative research: introducing focus groups. Bmj, 311(7000), 299302.
Maguire, R., 2013. Is there a role for apps in the future of safety management? System Safety Conference incorporating the Cyber

                   Security Conference 2013, 8th IET International. IET, pp. 1–6.
Mascheroni, G., & Ólafsson, K.(2015). The mobile Internet: access, use, opportunities and divides among European children. New Media

                   and Society. Advance online publication. doi: 10.1177/1461444814567986
Monks, C. P., Mahdavi, J., & Rix, K. (2016). The emergence of cyberbullying in childhood: Parent and teacher perspectives. Psicología

                   Educativa, 22(1), 3948.
Morrison, A. H. (2009). An impossible future: John Perry Barlow's' Declaration of the independence of cyberspace'. New Media & Society,

                   11(12), 5371.
Ribble, M. (2008). Passport to digital citizenship. Learning & leading with technology, 36(4) , 1417.
Ribble, M. (2011). Digital citizenship in schools. International Society for Technology in Education.
SadaghianiTabrizi, A. (2018). Integrating Cybersecurity Education in K6 Curriculum: Schoolteachers, IT Experts, and Parents' Perceptions

                   (Doctoral dissertation, University of Phoenix).
ShiffletChila, E. D., Harold, R. D., Fitton, V. A., & Ahmedani, B. K. (2016). Adolescent and family development: Autonomy and identity in

                   the digital age. Children and Youth Services Review, 70, 364–368.
                   https://doi.org/10.1016/j.childyouth.2016.10.005
Staksrud, E. (2013). Online grooming: Kneejerk regulation? European Journal of Communication, 28, 152–167.
Subrahmanyam, K., & Greenfiel, P. (2008). <Online Communication and Adolescent Relationship.pdf>. Journal of Applied
                   Developmental Psychology, 29(1), 420–433. https://doi.org/10.1353/foc.0.0006
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97102.
Winters, N. (2007). What is mobile learning. Big issues in mobile learning, 711.
Yan, Z. (2013). The Science of Cyber Behavior: An Emerged Field of Research. International Journal of Cyber Behavior, Psychology and
                   Learning (IJCBPL), 3(2), 8287.

                                                                                                                   511
   223   224   225   226   227   228   229   230   231   232   233