posted by user: mercefort || 3710 views || tracked by 8 users: [display]

eLearning Papers 2012 : eLearning Papers. Call for Papers: Cyber Security and Education


When Feb 15, 2012 - Mar 16, 2012
Where Europe
Submission Deadline Mar 16, 2012
Categories    education   safety   media_literacy   elearning

Call For Papers

Cyber Security and Education (Deadline March 16, 2012)

With the rapid evolution of online media, new technologies have become more targeted and more sophisticated. Web 2.0 applications facilitate users' creativity, they not only enable sharing of content, but also co-creating it with others. This new context has been widely recognized in relation to its educational, social and even economic benefits. Wide use and popularity of social media also brings to the fore the notion of security and concerns regarding the management of the personal information circulating and stored on the web. Schools are an important resource, now that young people's use of the Internet is growing, and smaller children are quickly gaining access to and becoming proficient users of technology.

In fact, the European Safer Internet Program (2009-2013) has assessed the status of online safety education in schools and has identified the educational sector as a main stakeholder in the promotion of safe use of the Internet and other communication technologies. In this light, the next issue of eLearning Papers will address the role the educational sector has in teaching children and young people about cyber security.

Addressing Cyber Security in schools should foster critical digital literacy, such that children can become empowered to make informed decisions about how they choose to use and share information online. Certain competences have been identified as necessary skills young people should have in order to manage security online. These skills include the ability to adopt a critical use of new media (including the ability to assess sources), understanding how to present oneself online, in terms of privacy, identity and reputation management, and developing responsible and ethical online behaviour. A focus on these competencies signals a shift in teaching ICT in the classroom, providing instruction not only on at how technology works, but also on its use.

An educational approach to Cyber Security means raising student awareness of the risks and consequences of their online practices. It should provide a platform that teaches students to recognize and prevent real risks, such as cyber-bullying, identity theft or sexual harassment, and introduces them to existing risk prevention resources, like the Online Police. While there is consensus on the pressing nature of these risks, incorporating Cyber Security into the curriculum is a new practice, at best. The field is in need of best practice scenarios and in-depth discussions surrounding how students can be encouraged to engage in safe Internet use.

eLearning Papers seeks contributions about Cyber Security for young people and the educational sector in both sections: In-Depth and From the Field. We specifically invite contributions which address one or several of the following issues:

Useful approaches to online security in curriculum design and teaching practice
Good practice in Cyber Security
Teaching, learning and promoting critical digital literacy
Defining at-risk populations and specific security concerns
National approaches to online safety; national information society policies or ICT in education policies
Competences for online safety education
Safety risks for young people and children (safe behaviour online, privacy issues, cyber-bullying, intellectual property rights, involuntary disclosure, etc.)

The article submission closes on March 16, 2012.

The provisional date of publication is April 20, 2012.

For further information and to submit your article, please contact:

Guest editor: Jean Underwood, Professor of Psychology, Nottingham Trent University, UK

The submissions need to comply with the following guidelines:

Submission language: English
Title: must effectively and creatively communicate the content of the article and may include a subtitle.
Executive summary for In-depth section should not exceed 200 words.
Executive summary for From the field section should not exceed 50 words.
Keywords: up to five relevant keywords need to be included.
In-depth full texts: articles should range from 4,000 to 6,000 words.
From the field texts: texts should not exceed 1,200 words.
Conclusions: special importance is given to the representation of the conclusions, which should be clearly stated both in the summary and at the end of the article.
References: All the references must be adequately cited and listed.
Author profile: author name, institution, position and e-mail address must accompany each submission.
Images: Please send high resolution JPEG files

See the complete guidelines at: Instructions for writers

Related Resources

MTAP-SI [1200] 2020   Special Issue call for Papers in Machine Vision Theory and Applications for Cyber Physical Systems [1200]
Online Live 2020   17th ICTEL 2020 – International Conference on Teaching, Education & Learning, 31 Aug -01 Sep, Barcelona
eLmL 2020   The Twelfth International Conference on Mobile, Hybrid, and On-line Learning
EduTeach 2020   5th Canadian Conference on Advances in Education, Teaching & Technology 2020
The eLearning Literacy for Suddenly Onli 2020   The eLearning Literacy for Suddenly Online: Considerations of Theory, Research, and Practice
9th ICTEL Paris 2021   9th ICTEL 2021 – International Conference on Teaching, Education & Learning, 31 May-01 June, Paris
ADRW 2021   «Archives during rebellions and wars». From the age of Napoleon to the cyber war era
ACM--WAIE--Ei Compendex, Scopus 2020   ACM--2020 2nd International Workshop on Artificial Intelligence and Education (WAIE 2020)--EI Compendex, Scopus
JCST Special Section 2020   Call for Papers --- JCST Special Section on 'Learning from Small Samples'
Special Issue of TEVC 2020   IEEE Transactions on Evolutionary Computation CALL FOR PAPERS for Special Issue: Evolutionary Computation Meets Deep Learning