Page 228 - Binder2
P. 228
2030
Gratian, M., Bandi, S., Cukier, M., Dykstra, J., & Ginther, A. (2018). Correlating human traits and cyber security behavior intentions.
computers & security, 73, 345358.
Hao, Y., Lee, K. S., Chen, S. T., & Sim, S. C. (2018). An Evaluative Study of a Mobile Application for Middle School Students Struggling
with English Vocabulary Learning. Computers in Human Behavior.
Human Rights. (20 NOVEMBER, 1989). Convention on the Rights of the Child. Retrieved from UNITED NATION HUMAN RIGHTS
OFFICE OF THE HIGH COMMISSIONER: https://www.ohchr.org/en/professionalinterest/pages/crc.aspx
International Telecommunications Union (ITU). ITUTX.1205: series X: data networks, open system communications and security:
telecommunication security: overview of cybersecurity 2008.
Islam, N., Want, R., 2014. Smartphones: past, present, and future. IEEE Pervasive Comput. (4), 89–92.
ITU (2016). ICT facts and figures 2016. Geneva, Switzerland: International Telecommunications Union. Retrieved January, 2017 from
http://www.itu.int/en/ITUD/Statistics/Documents/facts/ICTFactsFigures2016.pdf.
Jones, C., & Shao, B. (2011). The net generation and digital natives: implications for higher education
Kitzinger, J. (1995). Qualitative research: introducing focus groups. Bmj, 311(7000), 299302.
Maguire, R., 2013. Is there a role for apps in the future of safety management? System Safety Conference incorporating the Cyber
Security Conference 2013, 8th IET International. IET, pp. 1–6.
Mascheroni, G., & Ólafsson, K.(2015). The mobile Internet: access, use, opportunities and divides among European children. New Media
and Society. Advance online publication. doi: 10.1177/1461444814567986
Monks, C. P., Mahdavi, J., & Rix, K. (2016). The emergence of cyberbullying in childhood: Parent and teacher perspectives. Psicología
Educativa, 22(1), 3948.
Morrison, A. H. (2009). An impossible future: John Perry Barlow's' Declaration of the independence of cyberspace'. New Media & Society,
11(12), 5371.
Ribble, M. (2008). Passport to digital citizenship. Learning & leading with technology, 36(4) , 1417.
Ribble, M. (2011). Digital citizenship in schools. International Society for Technology in Education.
SadaghianiTabrizi, A. (2018). Integrating Cybersecurity Education in K6 Curriculum: Schoolteachers, IT Experts, and Parents' Perceptions
(Doctoral dissertation, University of Phoenix).
ShiffletChila, E. D., Harold, R. D., Fitton, V. A., & Ahmedani, B. K. (2016). Adolescent and family development: Autonomy and identity in
the digital age. Children and Youth Services Review, 70, 364–368.
https://doi.org/10.1016/j.childyouth.2016.10.005
Staksrud, E. (2013). Online grooming: Kneejerk regulation? European Journal of Communication, 28, 152–167.
Subrahmanyam, K., & Greenfiel, P. (2008). <Online Communication and Adolescent Relationship.pdf>. Journal of Applied
Developmental Psychology, 29(1), 420–433. https://doi.org/10.1353/foc.0.0006
Von Solms, R., & Van Niekerk, J. (2013). From information security to cyber security. computers & security, 38, 97102.
Winters, N. (2007). What is mobile learning. Big issues in mobile learning, 711.
Yan, Z. (2013). The Science of Cyber Behavior: An Emerged Field of Research. International Journal of Cyber Behavior, Psychology and
Learning (IJCBPL), 3(2), 8287.
511