Группа авторов

Perceptions and Analysis of Digital Risks


Скачать книгу

href="#ucef3b8fb-84be-5227-9a05-33af76e11e6d">Conclusion

      10  Postface

      11  List of Authors

      12  Index

      13  End User License Agreement

      List of Illustrations

      1 Chapter 1Figure 1.1. Distribution of respondents addressing digital risks by institutionFigure 1.2. Distribution of respondents addressing digital risks by disciplinary...Figure 1.3. Teachers’ perceived risks to themselves and students

      2 Chapter 3Figure 3.1. Age of the respondents. For a color version of this figure, see www....

      3 Chapter 4Figure 4.1. Key elements of security within Orange (adapted from Orange (2017))Figure 4.2. Shared responsibility in the approach to security (adapted from Oran...

      4 Chapter 5Figure 5.1. Screenshot of a French money-making scam message. The message claims...Figure 5.2. Screenshot of a fraudulent money transaction message in French

      5 Chapter 6Figure 6.1. Modeling information practices on DSNsFigure 6.2. Star graph of dangers6. For a color version of this figure, see www....Figure 6.3. Star graph of risks and risk factors7. For a color version of this f...Figure 6.4. Star graph of attention8. For a color version of this figure, see ww...Figure 6.5. Star graph of freedom and constraints9. For a color version of this ...

      6 Chapter 7Figure 7.1. Methodology of research on the representations of digital technology...Figure 7.2. Frequency of digital technology use in the classroomFigure 7.3. MIL in elementary school, department 64Figure 7.4. What media and information literacy means to elementary-level teache...Figure 7.5. Key words to define media literacy grouped by descriptors and micro ...Figure 7.6. Teachers’ feelings about digital technologyFigure 7.7. Ranking terms with the most occurrences when the topic of digital te...Figure 7.8. Representation of media and information literacy among elementary sc...Figure 7.9. What teachers think digital literacy contains

      List of Tables

      1 Chapter 2Table 2.1. Summary table of interviewsTable 2.2. Interviewee presence on social networks •: Active account; (△): Accou...

      2 Chapter 3Table 3.1. Profiles of the student teachers surveyed

      3 Chapter 4Table 4.1. Examples of risk definitions applicable to information

      4 Chapter 6Table 6.1. Description of the eight observation sites

      Guide

      1  Cover

      2  Table of Contents

      3  Title Page

      4  Copyright

      5  Foreword

      6  Introduction

      7  Begin Reading

      8  Conclusion

      9  Postface

      10  List of Authors

      11  Index

      12  Other titles from iSTE in Information Systems, Web and Pervasive Computing

      13  End User License Agreement

      Pages

      1  v

      2  iii

      3  iv

      4  xi

      5  xii

      6  xiii

      7  xiv

      8  xv

      9  xvi

      10  xvii

      11  xviii

      12  xix

      13  xx

      14  xxi

      15  1

      16  3

      17  4

      18  5

      19  6

      20  7

      21  8

      22  9

      23  10

      24