href="#ucef3b8fb-84be-5227-9a05-33af76e11e6d">Conclusion
10 Postface
12 Index
List of Illustrations
1 Chapter 1Figure 1.1. Distribution of respondents addressing digital risks by institutionFigure 1.2. Distribution of respondents addressing digital risks by disciplinary...Figure 1.3. Teachers’ perceived risks to themselves and students
2 Chapter 3Figure 3.1. Age of the respondents. For a color version of this figure, see www....
3 Chapter 4Figure 4.1. Key elements of security within Orange (adapted from Orange (2017))Figure 4.2. Shared responsibility in the approach to security (adapted from Oran...
4 Chapter 5Figure 5.1. Screenshot of a French money-making scam message. The message claims...Figure 5.2. Screenshot of a fraudulent money transaction message in French
5 Chapter 6Figure 6.1. Modeling information practices on DSNsFigure 6.2. Star graph of dangers6. For a color version of this figure, see www....Figure 6.3. Star graph of risks and risk factors7. For a color version of this f...Figure 6.4. Star graph of attention8. For a color version of this figure, see ww...Figure 6.5. Star graph of freedom and constraints9. For a color version of this ...
6 Chapter 7Figure 7.1. Methodology of research on the representations of digital technology...Figure 7.2. Frequency of digital technology use in the classroomFigure 7.3. MIL in elementary school, department 64Figure 7.4. What media and information literacy means to elementary-level teache...Figure 7.5. Key words to define media literacy grouped by descriptors and micro ...Figure 7.6. Teachers’ feelings about digital technologyFigure 7.7. Ranking terms with the most occurrences when the topic of digital te...Figure 7.8. Representation of media and information literacy among elementary sc...Figure 7.9. What teachers think digital literacy contains
List of Tables
1 Chapter 2Table 2.1. Summary table of interviewsTable 2.2. Interviewee presence on social networks •: Active account; (△): Accou...
2 Chapter 3Table 3.1. Profiles of the student teachers surveyed
3 Chapter 4Table 4.1. Examples of risk definitions applicable to information
4 Chapter 6Table 6.1. Description of the eight observation sites
Guide
1 Cover
5 Foreword
9 Postface
11 Index
12 Other titles from iSTE in Information Systems, Web and Pervasive Computing
Pages
1 v
2 iii
3 iv
4 xi
5 xii
6 xiii
7 xiv
8 xv
9 xvi
10 xvii
11 xviii
12 xix
13 xx
14 xxi
15 1
16 3
17 4
18 5
19 6
20 7
21 8
22 9
23 10
24