Abstract:Although considerable academic interest has focused on serious cyber-crimes, more commonplace Internet misuses (e.g., misrepresentation of self, unauthorized downloading, Internet pornography, online plagiarism, and other "cyber-cheating") have received less attention. Although these transgressions are of minor legal importance, they merit closer academic scrutiny. Based on a self-report study of 1,222 U.K. undergraduate students, this article explores the prevalence, nature, and underpinning facilitators of f… Show more
“…Even more alarming was the response to the next question, compounded by the condition that this activity of using large portions of the works of others was done on the Internet. Apparently the notion prevails that the law does not necessarily apply when it comes to Internet contents (Selwyn, 2008), as the number of students responding correctly, that such use is illegal, is an embarrassing 28%. The de facto access to vast amounts of information on the Web continues to confuse students, who still believe that if a document can be obtained online, there are no limitations or restrictions regarding its use.…”
Section: Problems Related With the Digital Settingmentioning
“…Even more alarming was the response to the next question, compounded by the condition that this activity of using large portions of the works of others was done on the Internet. Apparently the notion prevails that the law does not necessarily apply when it comes to Internet contents (Selwyn, 2008), as the number of students responding correctly, that such use is illegal, is an embarrassing 28%. The de facto access to vast amounts of information on the Web continues to confuse students, who still believe that if a document can be obtained online, there are no limitations or restrictions regarding its use.…”
Section: Problems Related With the Digital Settingmentioning
“…The normalisation of the internet has been accompanied by a set of more critical discourses concerning the potential abuse of technology, particularly because of some users' propensity for non-conformist, unethical or deviant behaviour while online (Selwyn, 2008). The internet has paved the way for many new forms of irregular behaviour (Freestone & Mitchell, 2004), such as dishonest, disruptive or deviant online activities and actions.…”
Section: Cyber-safetymentioning
confidence: 99%
“…These irregular behaviours can be classified under cyber crime and cyber misbehaviour (Selwyn, 2008). School learners are at risk if they do not understand the dangers of their own cyber activities (S. von Solms & von Solms, 2014).…”
Virtually all school learners today have access to ICT devices and the internet at home or at school. More and more schools are using ICT devices to improve education in South Africa. ICT devices and internet access have enormous advantages and assist learners in learning and teachers in teaching more successfully. However, with these advantages come numerous ICT and cyber-risks and threats that can harm learners, for example cyber-bullying, identity theft and access to inappropriate material. Currently, South Africa does not have a long-term plan to grow a cyber-safety culture in its schools. This research therefore proposes a short-term initiative in the form of a game-based approach, which will assist school learners in becoming more cyber safe and teach learners about the relevant cyber-related risks and threats. The research is based on a quantitative survey that was conducted among primary school learners to establish if the game-based approach would be a feasible short-term initiative. The aim of the research is to establish if a game based approach can be used to improve cyber-safety awareness. This approach was plotted into the required ICT and cyber-safety policy required by all schools.
“…The definitions of Internet addiction and factors that influence the phenomenon were developed further based on studies carried out in the USA, China, the UK, South Africa, Taiwan and Australia (Li, 2014;Jiang, 2014). Most of these study findings were derived from samples with student population at universities or high schools (Selwyn, 2008), but academic staff was included as well (Chang, 2008). The employee's population regarding Internet abuse is seldom studied in the literature.…”
Section: The Internet Deviance Problem and The Literature Studymentioning
Deviance, in a sociological context, is understood as actions or behaviours that violate social norms, including formally-enacted rules, as well as informal violations of social norms. Deviant behaviour related to Internet was studied mainly as a technology enabling misuse and addiction. In this paper deviant behaviour is studied in the context of two phenomena the addiction to the on-line services and the: abuse in the work place. Both phenomena enact the working forms and cause loss of productivity. As organizations and companies try to minimize the productivity losses resulting from their employees' Internet abuse in work place different approaches are used to solve the problem, some of them like e-surveillance and social control are in conflict with the social norms and the legislation order. The study presented in the paper explores the relationship between a person addicted to the Internet, and the factors that influence the abuse in the workplace. The study results discover whether these two phenomena are the result of the work environment like poor organizational structure in the company or bad human relationships. Another intention of the study was to find out whether the disciplinary measures applied to deter the Internet abuse have effects on the employees behaviour. The study results have shown that the occurrence of Internet abuse in workplace is not strongly related to the work conditions like the bad relationships with co-workers or managers, the missing actions for remuneration or recognition of the good work, and lack of paths for career advancement. The awareness of being e-surveyed by the employer, or being warned with personal messages about the misuse of Internet cause the time spent on the Internet for non-working purposes by the employee to decline. The study was carried out on an exhaustive sample inform an EU member state country where the legislative approach in employee e-surveying differ from other world regions. Managers were involved in this study to light up their everyday practice in deterring the Internet abuse in work place in view of the existing law for employee privacy protection in communication.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.