Review of existing Australian and international cyber-safety research

Information and communication technologies have permeated almost all areas of society and become an important component of daily functioning for most Australians. This is particularly true for Internet and mobile phone technology. The majority of Australian households (67% in 2007 – 2008) have acces...

Descripción completa

Guardado en:  
Detalles Bibliográficos
Autor principal: Cross, Donna (Autor)
Otros Autores: Treyvaud, Robyn ; Hearn, Lydia ; Dooley, Julian J.
Tipo de documento: Electrónico Libro
Lenguaje:Inglés
Publicado: 2009
En:Año: 2009
Acceso en línea: Volltext (kostenfrei)
Verificar disponibilidad: HBZ Gateway

MARC

LEADER 00000cam a22000002c 4500
001 1866122851
003 DE-627
005 20250124054855.0
007 cr uuu---uuuuu
008 231018s2009 xx |||||o 00| ||eng c
035 |a (DE-627)1866122851 
035 |a (DE-599)KXP1866122851 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Cross, Donna  |e VerfasserIn  |4 aut 
109 |a Cross, Donna 
245 1 0 |a Review of existing Australian and international cyber-safety research 
264 1 |c 2009 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a Information and communication technologies have permeated almost all areas of society and become an important component of daily functioning for most Australians. This is particularly true for Internet and mobile phone technology. The majority of Australian households (67% in 2007 – 2008) have access to the Internet and over 11 million Australians use the Internet as an integral part of their personal, social and occupational activities. By mid-2008, there were over 22 million active mobile phones being used in Australia, which equates to more than one phone for every citizen. There are many benefits associated with Internet and mobile phone use; however, there are also risks, particularly with the Internet. In fact, there is almost daily media discussion of these risks and dangers. However, to ensure that the information contained in this review was as accurate as possible, we primarily sourced quality research literature published in scientific journals both in Australia and overseas. In addition, quality material not published in scientific journals was consulted and included where appropriate, thus ensuring that this review was based on reliable research studies containing the most current and accurate research evidence available. From the outset, it is important to note that there are several methodological and ethical issues in relation associated with the measurement and examination of many cyber-safety risks. The nature of this type of research makes it very difficult to address certain risk areas, in particular those that relate to children (e.g., online grooming) 
700 1 |a Treyvaud, Robyn  |e VerfasserIn  |4 aut 
700 1 |a Hearn, Lydia  |e VerfasserIn  |4 aut 
700 1 |a Dooley, Julian J.  |e VerfasserIn  |4 aut 
856 4 0 |u https://core.ac.uk/download/81695353.pdf  |x Verlag  |z kostenfrei  |3 Volltext 
935 |a mkri 
951 |a BO 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 4391803615 
LOK |0 003 DE-627 
LOK |0 004 1866122851 
LOK |0 005 20231018043632 
LOK |0 008 231018||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)CORE40934242 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a core 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw