The Cyberethics, Cybersafety, and Cybersecurity at Schools

The Cyberethics, Cybersafety, and Cybersecurity at Schools

Irene L. Chen, Libi Shen
ISBN13: 9781799824664|ISBN10: 1799824667|EISBN13: 9781799824671
DOI: 10.4018/978-1-7998-2466-4.ch082
Cite Chapter Cite Chapter

MLA

Chen, Irene L., and Libi Shen. "The Cyberethics, Cybersafety, and Cybersecurity at Schools." Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2020, pp. 1395-1412. https://doi.org/10.4018/978-1-7998-2466-4.ch082

APA

Chen, I. L. & Shen, L. (2020). The Cyberethics, Cybersafety, and Cybersecurity at Schools. In I. Management Association (Ed.), Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications (pp. 1395-1412). IGI Global. https://doi.org/10.4018/978-1-7998-2466-4.ch082

Chicago

Chen, Irene L., and Libi Shen. "The Cyberethics, Cybersafety, and Cybersecurity at Schools." In Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 1395-1412. Hershey, PA: IGI Global, 2020. https://doi.org/10.4018/978-1-7998-2466-4.ch082

Export Reference

Mendeley
Favorite

Abstract

The 2006 Megan Meier case, where a teenage girl who was bullied on the Internet through e-mail and Myspace which was said to ultimately lead to her suicide, shed light on the cyber bullying issue in schools. This article uses a case study approach to describe how a number of school institutes were grappling with the loss of confidential information and protecting students on the WWW, each through a unique set of circumstances. It will reveal potential reactions of the institutions and possible ways to deal with the cyber threats. With experiences, school districts take measures to offer value education by improving students' knowledge and awareness of Cyberethics, Cybersafety, and Cybersecurity (C3) concepts to provide them with the means to protect themselves, and to enhance the safety and security of national infrastructure.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.