784
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Assessing and priming pre-service teachers’ attitudes about online privacy and their protection strategies for social networks, email and cloud storage

, , &
Pages 265-282 | Received 12 Apr 2021, Accepted 22 Jul 2022, Published online: 07 Sep 2022

References

  • Adhikari, K., & Panda, R. K. (2018). Users’ information privacy concerns and privacy protection behaviors in social networks. Journal of Global Marketing, 31(2), 96–110. https://doi.org/10.1080/08911762.2017.1412552
  • Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211. https://doi.org/10.1016/0749-5978(91)90020-T
  • Arpaci, I., Kilicer, K., & Bardakci, S. (2015). Effects of security and privacy concerns on educational use of cloud services. Computers in Human Behavior, 45, 93–98. https://doi.org/10.1016/j.chb.2014.11.075
  • Ball, D. L., Lubienski, S. T., & Mewborn, D. S. (2001). Research on teaching mathematics: The unsolved problem of teachers’ mathematical knowledge. In V. Richardson (Ed.), Handbook of Research on Teaching (Vol. 4, pp. 433–456). New York: Macmillan.
  • Bandura, A. (1977). Self-efficacy: toward a unifying theory of behavioral change. Psychological Review, 84(2), 191–215. https://doi.org/10.1037/0033-295X.84.2.191
  • BFS – Bundesamt für Statistik. (2021). STAT-TAB database. Neuchâtel. Schweizerische Eidgenossenschaft.
  • Carpenter, J. P., Kimmons, R., Short, C. R., Clements, K., & Staples, M. E. (2019). Teacher identity and crossing the professional-personal divide on twitter. Teaching and Teacher Education, 81, 1–12. https://doi.org/10.1016/j.tate.2019.01.011
  • Carpenter, J. P., Morrison, S. A., Craft, M., & Lee, M. (2020). How and why are educators using Instagram? Teaching and Teacher Education, 96, 103149. https://doi.org/10.1016/j.tate.2020.103149
  • Cimpanu, C. (2019). Microsoft discloses security breach that impacted some Outlook accounts. ZDNet. https://www.zdnet.com/article/microsoft-discloses-security-breach-impacting-some-outlook-accounts/
  • Cortina, J. M. (1993). What is coefficient alpha? An examination of theory and applications. Journal of Applied Psychology, 78(1), 98–104. https://doi.org/10.1037/0021-9010.78.1.98
  • Crossler, R. E. (2010). Protection motivation theory: Understanding determinants to backing up personal data. 2010 43rd Hawaii International Conference on System Sciences, 1–10.
  • Dinev, T., & Hart, P. (2004). Internet privacy concerns and their antecedents—Measurement validity and a regression model. Behaviour & Information Technology, 23(6), 413–422. https://doi.org/10.1080/01449290410001715723
  • Döbeli Honegger, B., & Hielscher, M. (2017). Vom Lehrplan zur LehrerInnenbildung—Erste Erfahrungen mit obligatorischer Informatikdidaktik für angehende Schweizer PrimarlehrerInnen. INFOS 2017, E-Learning Fachtagung Informatik, Lecture Notes in Informatics (LN) - Proceedings Series of the Gesellschaft Für Informatik (GI), 97–107.
  • EDK – Schweizerische Konferenz der kantonalen Erziehungsdirektoren. (2018). Digitalisierungsstrategie. Strategie der EDK vom 21. Juni 2018 für den Umgang mit Wandel durch Digitalisierung im Bildungswesen.
  • Fraillon, J., Ainley, J., Schulz, W., Friedman, T., & Duckworth, D. (2020). . In IEA international computer and information literacy study 2018 international report Springer https://doi.org/10.1007/978-3-030-38781-5
  • Frau-Meigs, D., Velez, I., & Michel, J. F. (2017). Mapping media and information literacy policies. New perspectives for the governance of MIL. In D. Frau-Meigs, I. Velez, & J. F. Michel (Eds.), Public policies in media and information literacy in Europe: Cross-country comparisons (pp. 19–88). London: Routledge.
  • Hermida, M. (2019). EU Kids Online Schweiz. In Schweizer Kinder und Jugendliche im Internet: Risiken und Chancen. Goldau: Pädagogische Hochschule Schwyz.
  • Hermida, M., & Schmid, R. (2019). Fachdidaktik Medien und Informatik: Professionalisierung der Medienpädagogik in der Schweiz. Ludwigsburger Beiträge zur Medienpädagogik, 19(20), 1–13. https://doi.org/10.21240/lbzm/20/06
  • Hichang, C. (2010). Determinants of behavioral responses to online privacy: The effects of concern, risk beliefs, self-efficacy, and communication sources on self-protection strategies. Journal of Information Privacy and Security, 6(1), 3–27. https://doi.org/10.1080/15536548.2010.10855879
  • Kimmons, R., & Veletsianos, G. (2014). The fragmented educator 2.0: Social networking sites, acceptable identity fragments, and the identity constellation. Computers & Education Vol. 72. (pp.292–301). https://doi.org/10.1016/j.compedu.2013.12.001
  • Kline, P. (2000). The Handbook of Psychological Testing. Routledge.
  • LaRose, R., Rifon, N., Liu, S., & Lee, D. (2005). Online safety strategies: A content analysis and theoretical assessment. The 55th Annual Conference of the International Communication Association.
  • Lozano, L. M., García-Cueto, E., & Muñiz, J. (2008). Effect of the number of response categories on the reliability and validity of rating scales. Methodology, 4(2), 73–79. https://doi.org/10.1027/1614-2241.4.2.73
  • Lwin, M., Wirtz, J., & Williams, J. D. (2007). Consumer online privacy concerns and responses: A power–responsibility equilibrium perspective. Journal of the Academy of Marketing Science, 35(4), 572–585. https://doi.org/10.1007/s11747-006-0003-3
  • Marín, V. I., Carpenter, J. P., & Tur, G. (2021). Pre-service teachers’ perceptions of social media data privacy policies. British Journal of Educational Technology, 52(2), 519–535. https://doi.org/10.1111/bjet.13035
  • Mikulec, E. A. (2012). Professional faces: Pre-service secondary teachers’ awareness of issues of self-disclosure on social-networking sites. Current Issues in Education, 15(3), 1–14. https://cie.asu.edu/ojs/index.php/cieatasu/article/view/938
  • Redecker, C. (2017). European framework for the digital competence of educators: DigCompEdu. Publications Office of the European Union.
  • Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93–114. https://doi.org/10.1080/00223980.1975.9915803
  • Rosenberg, M., Confessore, N., & Cadwalladr, C. (2018, March 17). How Trump consultants exploited the Facebook data of millions. New York Times Online. https://www.nytimes.com/2018/03/17/us/politics/cambridge-analytica-trump-campaign.html
  • Sedek, M., Ahmad, R., & Othman, N. F. (2018). Motivational factors in privacy protection behaviour model for social networking. MATEC Web of Conferences, 150, 05014. https://doi.org/10.1051/matecconf/201815005014
  • Simms, L. J., Zelazny, K., Williams, T. F., & Bernstein, L. (2019). Does the number of response options matter? Psychometric perspectives using personality questionnaire data. Psychological Assessment, 31(4), 557–566. https://doi.org/10.1037/pas0000648
  • Turner, K. (2016). Hacked Dropbox login data of 68 million users is now for sale on the dark Web. The Washington Post Online. https://www.washingtonpost.com/news/the-switch/wp/2016/09/07/hacked-dropbox-data-of-68-million-users-is-now-or-sale-on-the-dark-web/
  • Woon, I., Tan, G.-W., & Low, R. (2005). A protection motivation theory approach to home wireless security. Proceedings of the 26th International Conference on Information Systems, 367–380.