{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:28:44Z","timestamp":1754155724462,"version":"3.41.2"},"reference-count":40,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2015,4,20]],"date-time":"2015-04-20T00:00:00Z","timestamp":1429488000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4,20]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 The purpose of this paper is to propose an effective educational system to help students assess Web site risk by providing an environment in which students can better understand a Web site\u2019s features and determine the risks of accessing the Web site for themselves. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 The authors have enhanced a prototype visualization system for helping students assess Web site features and use them to identify risky Web sites. The system was implemented with our graphical search interface for multi-attribute metadata called \u201cConcentric Ring View\u201d and was tested using 13,386 actual and dummy Web sites and 11 Web site attributes. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The testing revealed several distinguishing attributes of risky Web sites, including being related to \u201cplay\u201d, having monotone colors, having many images, having many links and having many pages with much text in smaller font size. A usability test with 12 teenaged female students demonstrated that they could learn to identify some features of risky Web sites. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 As students cannot live in a safe cyberspace environment forever, they should be taught how to identify risky Web sites. We proposed an educational system to help students assess Web site features and identify high-risk Web site and verified the effectiveness of this system.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/itse-10-2013-0017","type":"journal-article","created":{"date-parts":[[2015,4,21]],"date-time":"2015-04-21T03:23:21Z","timestamp":1429586601000},"page":"14-30","source":"Crossref","is-referenced-by-count":0,"title":["An educational system to help students assess website features and identify high-risk websites"],"prefix":"10.1108","volume":"12","author":[{"given":"Tomoko","family":"Kajiyama","sequence":"first","affiliation":[]},{"given":"Isao","family":"Echizen","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"key2020122501222675200_b1","doi-asserted-by":"crossref","unstructured":"Bederson, B.\n                (2001), \u201cPhotoMesa: a zoomable image browser using quantum treemaps and bubblemaps\u201d, Proceedings of UIST\u201901, San Francisco, pp. 71-80.","DOI":"10.1145\/502348.502359"},{"key":"key2020122501222675200_b2","unstructured":"Burke, R.D.\n               , \n                  Hammond, K.J.\n                and \n                  Young, B.C.\n                (1996), \u201cKnowledge-based navigation of complex information spaces\u201d, Proceedings of The 13th National Conference on Artificial Intelligence, Menlo Park, pp. 462-468."},{"key":"key2020122501222675200_b3","unstructured":"Center for Educational Computing\n                (2005), \u201cThe E square advance (e2a) project\u201d, available at: www.cec.or.jp\/e-cec\/english-e2a.html (accessed 1 May 2013)."},{"key":"key2020122501222675200_b4","doi-asserted-by":"crossref","unstructured":"Chen, C.\n               , \n                  Tseng, F.S.C.\n                and \n                  Liang, T.T.\n                (2011), \u201cAn integration of fuzzy association rules and wordnet for document clustering\u201d, \n                  Knowledge and Information Systems\n               , Vol. 28 No. 3, pp. 687-708.","DOI":"10.1007\/s10115-010-0364-2"},{"key":"key2020122501222675200_b5","unstructured":"Cox, T.F.\n                and \n                  Cox, M.A.A.\n                (1994), \n                  Multi-Dimensional Scaling\n               , Chapman & Hall, London."},{"key":"key2020122501222675200_b6","doi-asserted-by":"crossref","unstructured":"Fowler, R.H.\n               , \n                  Fowler, W.A.\n                and \n                  Wilson, B.A.\n                (1991), \u201cIntegrating query, thesaurus and documents through a common visual representation\u201d, Proceedings of SIGIR\u201991, Chicago, pp. 142-151.","DOI":"10.1145\/122860.122874"},{"key":"key2020122501222675200_b7","doi-asserted-by":"crossref","unstructured":"Freire, M.\n               , \n                  Plaisant, C.\n               , \n                  Shneiderman, B.\n                and \n                  Golbeck, J.\n                (2010), \u201cManyNets: an interface for multiple network analysis and visualization\u201d, Proceedings of SIGCHI\u201910, available at: http:\/\/dl.acm.org\/citation.cfm?id=1753358, pp. 213-222.","DOI":"10.1145\/1753326.1753358"},{"key":"key2020122501222675200_b8","doi-asserted-by":"crossref","unstructured":"Fukushima, T.\n                (2003), \u201cBasic technologies and trends of web search engines: part 2 the recent topics\u201d, \n                  Journal of Information Processing and Management\n               , Vol. 46 No. 7, pp. 436-445.","DOI":"10.1241\/johokanri.46.436"},{"key":"key2020122501222675200_b9","doi-asserted-by":"crossref","unstructured":"Hearst, M.A.\n                (2006), \u201cClustering versus faceted categories for information exploration\u201d, \n                  Communications of the ACM\n               , Vol. 49 No. 4, pp. 59-61.","DOI":"10.1145\/1121949.1121983"},{"key":"key2020122501222675200_b10","unstructured":"Heer, J.\n                and \n                  Boyd, D.\n                (2005), \u201cVizster: visualizing online social networks\u201d, Proceedings of IEEE Symposium on Information Visualization (INFOVIS\u201905), Los Alamitos, pp. 32-39."},{"key":"key2020122501222675200_b11","doi-asserted-by":"crossref","unstructured":"Ho, W.H.\n                and \n                  Watters, P.A.\n                (2004), \u201cStatistical and structural approaches to filtering internet pornography\u201d, Proceedings of IEEE International Conference on Systems, Man and Cybernetics, pp. 4792-4798.","DOI":"10.1109\/ICSMC.2004.1401289"},{"key":"key2020122501222675200_b12","unstructured":"Hutchinson, H.B.\n               , \n                  Bederson, B.B.\n                and \n                  Druin, A.\n                (2006), \u201cThe evolution of the international students\u2019s digital library searching and browsing interface\u201d, Proceedings of the Interaction Design and Children, Cuomo, pp. 105-112."},{"key":"key2020122501222675200_b13","unstructured":"Ikeda, K.\n               , \n                  Yanagihara, T.\n               , \n                  Hattori, G.\n               , \n                  Ono, C.\n                and \n                  Takashima, Y.\n                (2011), \u201cDetection of malicious web pages based on HTML elements\u201d, \n                  Transactions of Information Processing Society of Japan\n               , Vol. 52 No. 8, pp. 2474-2483."},{"key":"key2020122501222675200_b14","doi-asserted-by":"crossref","unstructured":"Jakobsen, M.R.\n                and \n                  Hornb\u00e6k, K.\n                (2011), \u201cFisheye interfaces \u2013 research problems and practical challenges\u201d, in \n                  Ebert, A.\n               , \n                  Dix, A.\n               , \n                  Gershon, N.\n                and \n                  Pohl, M.\n                (Eds), \n                  Human Aspects of Visualization\n               , LNCS 6431, Springer, Berlin\/Heidelberg, pp. 76-91.","DOI":"10.1007\/978-3-642-19641-6_6"},{"key":"key2020122501222675200_b15","unstructured":"Johnson, B.\n                and \n                  Shneiderman, B.\n                (1991), \u201cTree-maps: a space filling approach to the visualization of hierarchical information space\u201d, Proceedings of IEEE Visualization\u201991, Piscataway, NJ, pp. 275-282."},{"key":"key2020122501222675200_b16","doi-asserted-by":"crossref","unstructured":"Kajiyama, T.\n                (2011), \u201cBotanical data retrieval system for discovery learning\u201d, Proceedings of ACM International Conference on Multimedia Retrieval (ACM ICMR), Trento, p. 5.","DOI":"10.1145\/1991996.1992032"},{"key":"key2020122501222675200_b17","doi-asserted-by":"crossref","unstructured":"Kajiyama, T.\n                and \n                  Echizen, I.\n                (2012), \u201cEvaluation of an improved visualization system for helping children identify risky websites\u201d, Proceedings of the International Conference on Availability, Reliability and Security (ARES 2012), available at: http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6329222&tag=1, pp. 495-498.","DOI":"10.1109\/ARES.2012.48"},{"key":"key2020122501222675200_b18","doi-asserted-by":"crossref","unstructured":"Kajiyama, T.\n                and \n                  Satoh, S.\n                (2010), \u201cConstruction of image retrieval systems focused on user knowledge interaction\u201d, Proceedings of ACM Multimedia, available at: http:\/\/link.springer.com\/article\/10.1007%2Fs10115-012-0611-9, pp. 1673-1676.","DOI":"10.1145\/1873951.1874319"},{"key":"key2020122501222675200_b19","unstructured":"Kajiyama, T.\n                and \n                  Satoh, S.\n                (2013), \u201cAn interaction model between human and system for intuitive graphical search interface\u201d, \n                  International Journal of Knowledge and Information Systems\n               , Springer-Verlag, London, p. 20."},{"key":"key2020122501222675200_b20","doi-asserted-by":"crossref","unstructured":"Kohonen, T.\n                (2000), \n                  Self-Organizing Maps\n               , Springer, London.","DOI":"10.1007\/978-3-642-56927-2"},{"key":"key2020122501222675200_b22","unstructured":"Nielsen Norman Group\n                (2010), \u201cChildren\u2019s websites: usability issues in designing for kids\u201d, available at: www.nngroup.com\/articles\/childrens-websites-usability-issues\/ (accessed 25 February 2014)."},{"key":"key2020122501222675200_b23","unstructured":"Nomura, J.\n                (2011), \n                  The Secrets of Colors\n               , Bungeishunju, Tokyo."},{"key":"key2020122501222675200_b24","unstructured":"NTT Resonant Inc. (NTTR)\n                (2010a), \u201ckids goo\u201d, available at: http:\/\/kids.goo.ne.jp (in Japanese) (accessed 1 May 2013)."},{"key":"key2020122501222675200_b25","unstructured":"NTT Resonant Inc. (NTTR)\n                (2010b), \u201cgoo\u201d, available at: www.goo.ne.jp (in Japanese). (accessed 1 May 2013)."},{"key":"key2020122501222675200_b26","doi-asserted-by":"crossref","unstructured":"Pang, C.\n                and \n                  Biuk-Aghai, R.P.\n                (2011), \u201cWikipedia world map: method and application of map-like wiki visualization\u201d, Proceedings of the 7th International Symposium on Wikis and Open Collaboration, Mountain View, pp. 124-133.","DOI":"10.1145\/2038558.2038579"},{"key":"key2020122501222675200_b27","unstructured":"Pratt, W.\n               , \n                  Hearst, M.A.\n                and \n                  Fagan, L.\n                (1999), \u201cA knowledge-based approach to organizing retrieved documents\u201d, Proceedings of the 16th National Conference on Artificial Intelligence (AAI\u201999), California, pp. 80-85."},{"key":"key2020122501222675200_b28","unstructured":"RBL.jp\n                (2010), \u201cBlock list check\u201d, available at: www.rbl.jp\/index-e.php (accessed 1 May 2013)."},{"key":"key2020122501222675200_b29","unstructured":"Renn, O.\n                and \n                  Klinke, A.\n                (2004), \u201cSystemic risks: a new challenge for risk management\u201d, \n                  EMBO Reports\n               , Vol. 5 No. 1S, pp. S41-S46."},{"key":"key2020122501222675200_b30","doi-asserted-by":"crossref","unstructured":"Robertson, G.G.\n               , \n                  Mackinlay, J.D.\n                and \n                  Card, S.K.\n                (1991), \u201cCone trees: animated 3D visualizations of hierarchical information\u201d, Proceedings of SIGCHI\u201991, New Orleans, Louisiana, pp. 189-194.","DOI":"10.1145\/108844.108883"},{"key":"key2020122501222675200_b31","doi-asserted-by":"crossref","unstructured":"Rodden, K.\n               , \n                  Basalaj, W.\n               , \n                  Sinclair, D.\n                and \n                  Wood, K.R.\n                (2001), \u201cDoes organisation by similarity assist image browsing?\u201d, Proceedings of SIGCHI\u201901, Cambridge, pp. 190-197.","DOI":"10.1145\/365024.365097"},{"key":"key2020122501222675200_b32","doi-asserted-by":"crossref","unstructured":"Rose, D.E.\n                and \n                  Belew, R.K.\n                (1991), \u201cA connectionist and symbolic hybrid for improving legal research\u201d, \n                  International Journal of Man-Machine Studies\n               , Vol. 35 No. 1, pp. 1-33.","DOI":"10.1016\/S0020-7373(07)80006-X"},{"key":"key2020122501222675200_b33","unstructured":"SpamCop.net\n                (2010), \u201cCisco Systems, Inc. blocking list\u201d, available at: www.spamcop.net (accessed 1 May 2013)."},{"key":"key2020122501222675200_b34","doi-asserted-by":"crossref","unstructured":"Stewart, R.\n               , \n                  Scott, G.\n                and \n                  Zelevinsky, V.\n                (2008), \u201cIdea navigation: structured browsing for unstructured text\u201d, Proceedings of SIGCHI \u201908, New York, NY, pp. 1789-1792.","DOI":"10.1145\/1357054.1357332"},{"key":"key2020122501222675200_b35","doi-asserted-by":"crossref","unstructured":"The Spamhaus Project\n                (2010), \u201cThe spamhaus block list\u201d, available at: www.spamhaus.org\/SBL\/ (accessed 1 May 2013).","DOI":"10.1016\/S1353-4858(13)70045-X"},{"key":"key2020122501222675200_b36","unstructured":"Vi\u00e9gas, F.B.\n                and \n                  Donath, J.\n                (2004), \u201cSocial network visualization: can we go beyond the graph\u201d, Proceedings of the 20th Anniversary Conference on Computer Supported Cooperative Work (CSCW\u201904), Workshop on Social Networks, Vol. 4, pp. 6-10, available at: http:\/\/citeseerx.ist.psu.edu\/viewdoc\/summary? doi=10.1.1.135.4963"},{"key":"key2020122501222675200_b37","doi-asserted-by":"crossref","unstructured":"Wang, Y.\n               , \n                  Wang, C.\n               , \n                  Lee, T.\n                and \n                  Ma, K.\n                (2011), \u201cFeature-preserving volume data reduction and focus+context visualization\u201d, \n                  IEEE Transactions on Visualization and Computer Graphics\n               , Vol. 17 No. 2, pp. 171-181.","DOI":"10.1109\/TVCG.2010.34"},{"key":"key2020122501222675200_b38","unstructured":"Yamawaki, K.\n                (2011), \n                  Color Psychology\n               , Natsumesha, Tokyo."},{"key":"key2020122501222675200_b39","unstructured":"Zhang, J.\n                and \n                  Marchionini, G.\n                (2005), \u201cEvaluation and evolution of a browse and search interface: relation browser++\u201d, Proceedings of the National Conference on Digital Government Research, Atlanta, GA, pp. 179-188."},{"key":"key2020122501222675200_b40","doi-asserted-by":"crossref","unstructured":"Zuo, H.\n               , \n                  Hu, W.\n                and \n                  Wu, O.\n                (2010), \u201cPatch-based skin color detection and its application to pornography image filtering\u201d, Proceedings of WWW\u201910, Carolina, pp. 1227-1228.","DOI":"10.1145\/1772690.1772887"},{"key":"key2020122501222675200_frd1","unstructured":"National Police Agency\n                (2012), \u201cCybercrime project\u201d, available at: www.npa.go.jp\/cyber\/statics\/ (accessed 25 February 2014)."}],"container-title":["Interactive Technology and Smart Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ITSE-10-2013-0017","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITSE-10-2013-0017\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITSE-10-2013-0017\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:57:02Z","timestamp":1753394222000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itse\/article\/12\/1\/14-30\/175735"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,20]]},"references-count":40,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,4,20]]}},"alternative-id":["10.1108\/ITSE-10-2013-0017"],"URL":"https:\/\/doi.org\/10.1108\/itse-10-2013-0017","relation":{},"ISSN":["1741-5659"],"issn-type":[{"type":"print","value":"1741-5659"}],"subject":[],"published":{"date-parts":[[2015,4,20]]}}}