{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T10:03:35Z","timestamp":1756461815281,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710839"},{"type":"electronic","value":"9783319710846"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71084-6_11","type":"book-chapter","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T07:37:22Z","timestamp":1510904242000},"page":"95-105","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Curriculum Approach to Improving Cyber Safety in South African Schools"],"prefix":"10.1007","author":[{"given":"E.","family":"Kritzinger","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,18]]},"reference":[{"issue":"1","key":"11_CR13","doi-asserted-by":"crossref","first-page":"65","DOI":"10.4018\/IJCBPL.2017010105","volume":"7","author":"AD Ahad","year":"2017","unstructured":"Ahad, A.D., Anshari, M.: Smartphone habits among youth. Int. J. Cyber Behav. Psychol. Learn. 7(1), 65\u201375 (2017)","journal-title":"Int. J. Cyber Behav. Psychol. Learn."},{"issue":"1","key":"11_CR1","first-page":"61","volume":"1","author":"SM Alsied","year":"2013","unstructured":"Alsied, S.M., Pathan, M.M.: The use of computer technology in EFL classroom: advantages and implications. Int. J. Engl. Lang. Transl. Stud. 1(1), 61\u201371 (2013)","journal-title":"Int. J. Engl. Lang. Transl. Stud."},{"key":"11_CR25","unstructured":"Badenhorst, C.: Legal responses to cyber bullying and sexting in South Africa. In: Centre for Justice and Crime Prevention (2011). Available at: \n            http:\/\/www.lse.ac.uk\/media@lse\/research\/Research-Projects\/Researching-Childrens-Rights\/pdf\/Issue-Paper-10---Legal-reponses-to-cyberbullying-and-sexting-in-SA.pdf\n            \n          . Accessed 27 March 2016"},{"key":"11_CR14","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.chb.2014.02.014","volume":"35","author":"CF Brown","year":"2014","unstructured":"Brown, C.F., Demaray, M.K., Secord, S.M.: Cyber victimization in middle school and relations to social emotional outcomes. Comput. Hum. Behav. 35, 12\u201321 (2014)","journal-title":"Comput. Hum. Behav."},{"issue":"3","key":"11_CR15","first-page":"95","volume":"2","author":"AM Chandrashekhar","year":"2016","unstructured":"Chandrashekhar, A.M., Muktha, G.S., Anjana, D.K.: Cyberstalking and cyberbullying?: effects and prevention measures. Imperial J. Interdisc. Res. 2(3), 95\u2013102 (2016)","journal-title":"Imperial J. Interdisc. Res."},{"issue":"6","key":"11_CR16","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/S1361-3723(10)70067-1","volume":"2010","author":"S Furnell","year":"2010","unstructured":"Furnell, S.: Jumping security hurdles. Comput. Fraud Secur. 2010(6), 10\u201314 (2010)","journal-title":"Comput. Fraud Secur."},{"issue":"5","key":"11_CR17","first-page":"1","volume":"70","author":"I Govender","year":"2015","unstructured":"Govender, I., Skea, B.: Teachers\u2019 understanding of e-safety: an exploratory case in KZN South Africa. Electron. J. Inf. Syst. Developing Countries. 70(5), 1\u201317 (2015)","journal-title":"Electron. J. Inf. Syst. Developing Countries."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1016\/j.compedu.2017.01.006","volume":"107","author":"H Heflin","year":"2017","unstructured":"Heflin, H., Shewmaker, J., Nguyen, J.: Impact of mobile technology on student attitudes, engagement, and learning. Comput. Educ. 107, 91\u201399 (2017). \nhttps:\/\/doi.org\/10.1016\/j.compedu.2017.01.006","journal-title":"Comput. Educ."},{"issue":"3","key":"11_CR3","first-page":"693","volume":"9","author":"M Huda","year":"2017","unstructured":"Huda, M., Jasmi, K.A., Hehsan, A., Mustari, M.I., Shahrill, M., Basiron, B., Gassama, S.K.: Empowering children with adaptive technology skills: careful engagement in the digital information age. Int. Electron. J. Elem. Educ. 9(3), 693\u2013708 (2017)","journal-title":"Int. Electron. J. Elem. Educ."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Kritzinger, E.: Short-term initiatives for enhancing cyber-safety within South African schools email. SACJ 28(1) (2016). \nhttp:\/\/doi.org\/10.18489\/sacj.v28i1.369","DOI":"10.18489\/sacj.v28i1.369"},{"issue":"8","key":"11_CR18","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1016\/j.cose.2010.08.001","volume":"29","author":"E Kritzinger","year":"2010","unstructured":"Kritzinger, E., Von Solms, S.H.: Cyber security for home users: a new way of protection through awareness enforcement. Comput. Secur. 29(8), 840\u2013847 (2010)","journal-title":"Comput. Secur."},{"key":"11_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-319-58553-6_10","volume-title":"Information Security Education for a Global Digital Society","author":"E Kritzinger","year":"2017","unstructured":"Kritzinger, E., Bada, M., Nurse, J.R.C.: A study into the cybersecurity awareness initiatives for school learners in South Africa and the UK. In: Bishop, M., Futcher, L., Miloslavskaya, N., Theocharidou, M. (eds.) WISE 2017. IAICT, vol. 503, pp. 110\u2013120. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-58553-6_10"},{"key":"11_CR6","doi-asserted-by":"publisher","unstructured":"Kritzinger, E., Padayachee, K.: Engendering an e-safety awareness culture within the South African context. In: IEEE AFRICON Conference (2013). \n10.1109\/AFRCON.2013.6757708","DOI":"10.1109\/AFRCON.2013.6757708"},{"key":"11_CR7","unstructured":"De Lange, M., Von Solms, R.: An e-safety educational framework in South Africa. In: Proceedings of the Southern Africa Telecommunication Networks and Applications Conference (SATNAC) (2012)"},{"issue":"3","key":"11_CR19","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1177\/0267323114521045","volume":"29","author":"S Livingstone","year":"2014","unstructured":"Livingstone, S., Kirwil, L., Ponte, C., Staksrud, E.: In their own words: what bothers children online? Eur. J. Commun. 29(3), 271\u2013288 (2014)","journal-title":"Eur. J. Commun."},{"issue":"1","key":"11_CR8","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1016\/j.compedu.2011.11.014","volume":"59","author":"L Plowman","year":"2012","unstructured":"Plowman, L., Stevenson, O., Stephen, C., McPake, J.: Preschool children\u2019s learning with technology at home. Comput. Educ. 59(1), 30\u201337 (2012). \nhttps:\/\/doi.org\/10.1016\/j.compedu.2011.11.014\n\n. Elsevier Ltd.","journal-title":"Comput. Educ."},{"issue":"1","key":"11_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/0004944116685622","volume":"61","author":"K Rigby","year":"2017","unstructured":"Rigby, K.: School perspectives on bullying and preventative strategies: an exploratory study. Aust. J. Educ. 61(1), 1\u201316 (2017)","journal-title":"Aust. J. Educ."},{"key":"11_CR21","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1016\/j.chb.2016.09.040","volume":"66","author":"K Royen Van","year":"2017","unstructured":"Van Royen, K., Poels, K., Vandebosch, H., Adam, P.: Thinking before posting? Reducing cyber harassment on social networking sites through a reflective message. Comput. Hum. Behav. 66, 345\u2013352 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"11_CR9","unstructured":"Shanmugam, K.R., Srinivas, K., Sathyavelu Reddy, K.: Information and communication technology (ICT) in education: advantages, disadvantages, conveniences and limitations. In: Proceedings of NAAC Sponsored National Seminar (2014)"},{"issue":"2","key":"11_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.15700\/saje.v35n2a1076","volume":"35","author":"D Smit","year":"2015","unstructured":"Smit, D.: Cyberbullying in South African and American schools: a legal comparative study. S. Afr. J. Educ. 35(2), 1\u201311 (2015)","journal-title":"S. Afr. J. Educ."},{"key":"11_CR11","unstructured":"Von Solms, S., Von Solms, R.: Towards cyber safety education in primary schools in Africa. In: Proceedings of the Eighth International Symposium on Human Aspects of Information Security & Assurance, HAISA 2014, pp. 185\u2013197 (2014)"},{"issue":"1","key":"11_CR22","first-page":"31","volume":"4","author":"JS Srivastava","year":"2017","unstructured":"Srivastava, J.S.: Cyber crime?: kids as soft targets. Int. J. Innovative Comput. Sci. Eng. 4(1), 31\u201336 (2017)","journal-title":"Int. J. Innovative Comput. Sci. Eng."},{"key":"11_CR12","unstructured":"Stone, K.: Keeping children and young people safe online: balancing risk and opportunity key messages (2013). \nhttp:\/\/goo.gl\/toJIXq"},{"key":"11_CR23","unstructured":"UNICEF: Your people\u2019s navigation of online risks (2012). \nhttp:\/\/goo.gl\/hqaXJ9\n\n. Accessed 10 Mar 2014"},{"key":"11_CR24","first-page":"1","volume-title":"Crime and the Internet","author":"D Wall","year":"2001","unstructured":"Wall, D.: Cybercrimes and the internet. In: Wall, D.S. (ed.) Crime and the Internet, pp. 1\u201317. Routledge, New York (2001)"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Education"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71084-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T05:07:26Z","timestamp":1520831246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71084-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710839","9783319710846"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71084-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}