What is it about?

This study (N = 1,092) identified technologies young people have access to, the degree to which they engage in risky online behavior, and their literacy of cyber security practices. Overall, participants showed poor judgment and a relaxed attitude toward their online safety, even though most understood many of the basic and more common terms and computer paradigms investigated. This study is predicated on the premise that effective awareness-raising education can be implemented through a better understanding of today’s youth and their online practices.

Featured Image

Why is it important?

The educational benefits made possible by the Internet have created a dilemma in that online use is encouraged, but the potential for online threats have caused apprehension. Parents, for example, tend to be supportive of the Internet to help with schoolwork, but also have serious concerns about their children’s online safety. While safeguards exist (i.e., legislation, technical controls), it is generally agreed that one of the most important methods of alleviating online risk is education to empower students, educators, and parents. For awareness-raising training and interventions to be implemented effectively, however, research is needed to identify what technologies young people have access to; understand the degree to which they engage in risky online behavior; and understand how and why some young people are exposed to certain online threats.

Perspectives

The findings should assist policymakers, educators, researchers, and parents to better understand young people’s online behavior and how such behavior contributes to risk; while also offering recommendations in the subsequent development and refinement of awareness-raising training and interventions.

Boaventura DaCosta
Solers Research Group

Read the Original

This page is a summary of: Mitigating Online Threats While Promoting Scholarship Through Awareness-Raising Interventions, January 2019, IGI Global,
DOI: 10.4018/978-1-5225-8900-6.ch043.
You can read the full text:

Read

Contributors

The following have contributed to this page