Amene Sedighian Bidgoli
Abstract
Along with the proliferation of media technologies and the increasing presence of students in cyberspace, many researches have also been conducted on issues related to them. One of the emerging issues related to crimes and harassment that occur in cyberspace, which range from cracking software locks ...
Read More
Along with the proliferation of media technologies and the increasing presence of students in cyberspace, many researches have also been conducted on issues related to them. One of the emerging issues related to crimes and harassment that occur in cyberspace, which range from cracking software locks to cyberbullying. This article, with a sociological perspective seeks to investigate cyber aberrations and examines the impact of religiosity, social bonding, and demographic variables on the dependent variable from the perspective of social bonding and social control theories. This article using survey method and questionnaire tool had focused on students of Tehran universities. The sample size selected as 400 cases. The religiosity was measured in three aspects as known as beliefs, rituals and commitments. The overall index has a mean equal to 3.18 which illustrates the medium upward religiosity of university students. (75.1%) of students had a moderate to high level of social bond. The cyber deviation index shows that only 14.2% of students had been involved much or too much with these deviations. These deviations were more common among students of lower grades and younger ages. Religiosity and social bonding have both been inversely correlated with these deviations. Also, regression analysis shows that the theoretical model of this study was able to explain (73.7%) of the changes in cyber deviations. In addition, the results of path analysis show that the variable that had the most direct impact on the dependent variable was the social bond variable.
parvaneh faramarziani; Baqer Ansari; muhammed soltanifar; َafsaneh mozafari
Abstract
The aim of this study was to design and evaluate a conceptual model of strategies to protect children's privacy in cyberspace in two qualitative-quantitative methods. After reviewing the background and theoretical concepts of the research, using the qualitative method of in-depth interviews with 18 experts ...
Read More
The aim of this study was to design and evaluate a conceptual model of strategies to protect children's privacy in cyberspace in two qualitative-quantitative methods. After reviewing the background and theoretical concepts of the research, using the qualitative method of in-depth interviews with 18 experts in the field of communication, law and psychology with purposive probability sampling method, the research data reached theoretical saturation, interpreted using thematic analysis and model A concept was created. The research findings showed six comprehensive themes and 17 organized themes as the main branches of strategies to protect children's privacy in cyberspace, which include: social (social environment), cultural (culture-building), legal (legislation, preparation requirements). Consent, access requirements), educational (media literacy, content production, critical thinking, formal education, knowledge management, development of literacy and thought), economic (investment) management (technical requirements, policy, training, organizational security, support Institutional). In the quantitative section, in order to fit the model, a researcher-made questionnaire was distributed among 160 child specialists and activists who were selected by relative sampling method and Morgan-Krejcie formula. The descriptive findings of the quantitative part showed that the total index of the solutions is at a desirable level and the inferential findings of the quantitative part of the research using factor analysis showed that the reproduced model has the necessary fit. The conceptual model used in the formulation of strategies and laws necessary for policy-making and planning to protect the privacy of children in cyberspace..