{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:59Z","timestamp":1750220099604,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,1,14]],"date-time":"2022-01-14T00:00:00Z","timestamp":1642118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,1,14]]},"DOI":"10.1145\/3514262.3514278","type":"proceedings-article","created":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T22:26:06Z","timestamp":1650407166000},"page":"184-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Teachers\u2019 Role and Level of Awareness on Safe Internet Use and its Legal Implications in the Conduct of Online Classes during the Pandemic"],"prefix":"10.1145","author":[{"given":"April Sandy I.","family":"Gallarin","sequence":"first","affiliation":[{"name":"De La Salle University, Philippines and La Salle Green Hills, Philippines"}]},{"given":"Ralph Martin L.","family":"Mascarenas","sequence":"additional","affiliation":[{"name":"De La Salle University, Philippines and Claret School of Quezon City, Philippines"}]},{"given":"Gerda O.","family":"Dizon","sequence":"additional","affiliation":[{"name":"De La Salle University, Philippines"}]},{"given":"Mariquit Y.","family":"Tamayo","sequence":"additional","affiliation":[{"name":"De La Salle University, Philippines"}]},{"given":"Jocelyn P.","family":"Cruz","sequence":"additional","affiliation":[{"name":"De La Salle University, Philippines"}]}],"member":"320","published-online":{"date-parts":[[2022,4,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Aminian N. (2021 February 16). What is Cybersecurity Risk? Definition & Factors to Consider. Security Scorecard. https:\/\/securityscorecard.com\/blog\/what-is-cybersecurity-risk-factors-to-consider  Aminian N. (2021 February 16). What is Cybersecurity Risk? Definition & Factors to Consider. Security Scorecard. https:\/\/securityscorecard.com\/blog\/what-is-cybersecurity-risk-factors-to-consider"},{"key":"e_1_3_2_1_2_1","unstructured":"Barazani D. (n.d.). Sampling Methods. IB Psych Matters. https:\/\/www.ibpsychmatters.com  Barazani D. (n.d.). Sampling Methods. IB Psych Matters. https:\/\/www.ibpsychmatters.com"},{"key":"e_1_3_2_1_3_1","volume-title":"Security risks and protection in online learning: A survey. The International Review of Research in Open and Distributed Learning, 14(5). https:\/\/doi.org\/10.19173\/irrodl.v14i5.1632","author":"Chen Y.","year":"2013","unstructured":"Chen , Y. , & He , W. ( 2013 ). Security risks and protection in online learning: A survey. The International Review of Research in Open and Distributed Learning, 14(5). https:\/\/doi.org\/10.19173\/irrodl.v14i5.1632 10.19173\/irrodl.v14i5.1632 Chen, Y., & He, W. (2013). Security risks and protection in online learning: A survey. The International Review of Research in Open and Distributed Learning, 14(5). https:\/\/doi.org\/10.19173\/irrodl.v14i5.1632"},{"key":"e_1_3_2_1_4_1","volume-title":"Republic Act 10173 \u2013 Data Privacy Act of","author":"Congress","year":"2012","unstructured":"Congress of the Philippines. (2016, July 19). Republic Act 10173 \u2013 Data Privacy Act of 2012 . Official Gazette of the Republic of the Philippines . https:\/\/www.privacy.gov.ph\/data-privacy-act\/ Congress of the Philippines. (2016, July 19). Republic Act 10173 \u2013 Data Privacy Act of 2012. Official Gazette of the Republic of the Philippines. https:\/\/www.privacy.gov.ph\/data-privacy-act\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.18844\/wjet.v12i4.5182"},{"issue":"2","key":"e_1_3_2_1_6_1","first-page":"3","article-title":"ICTs for learning: An overview of systemic initiatives in the Australian states and territories","volume":"17","author":"Finger G.","year":"2002","unstructured":"Finger , G. , & Trinidad , S. ( 2002 ). ICTs for learning: An overview of systemic initiatives in the Australian states and territories . Australian Educational Computing , 17 ( 2 ), 3 - 14 . Finger, G., & Trinidad, S. (2002). ICTs for learning: An overview of systemic initiatives in the Australian states and territories. Australian Educational Computing, 17(2), 3-14.","journal-title":"Australian Educational Computing"},{"key":"e_1_3_2_1_7_1","volume-title":"How to Design and Evaluate Research in Education","author":"Fraenkel J.","year":"2011","unstructured":"Fraenkel , J. , Wallen , N. , & Hyun , H. ( 2011 ). How to Design and Evaluate Research in Education ( 8 th ed.). McGraw-Hill Education . https:\/\/saochhengpheng.files.wordpress.com\/2017\/03\/jack_fraenkel_norman_wallen_helen_hyun-how_to_design_and_evaluate_research_in_education_8th_edition_-mcgraw-hill_humanities_social_sciences_languages2011.pdf Fraenkel, J., Wallen, N., & Hyun, H. (2011). How to Design and Evaluate Research in Education (8th ed.). McGraw-Hill Education. https:\/\/saochhengpheng.files.wordpress.com\/2017\/03\/jack_fraenkel_norman_wallen_helen_hyun-how_to_design_and_evaluate_research_in_education_8th_edition_-mcgraw-hill_humanities_social_sciences_languages2011.pdf","edition":"8"},{"key":"e_1_3_2_1_8_1","unstructured":"Kaspersky. (2021 August 24). Digital Education: The cyber risks of the online classroom. Securelist. https:\/\/securelist.com\/digital-education-the-cyberrisks-of-the-online-classroom\/98380\/  Kaspersky. (2021 August 24). Digital Education: The cyber risks of the online classroom. Securelist. https:\/\/securelist.com\/digital-education-the-cyberrisks-of-the-online-classroom\/98380\/"},{"key":"e_1_3_2_1_9_1","volume-title":"International Journal of Applied Research. https:\/\/www.allresearchjournal.com\/archives\/2017\/vol3issue7\/PartK\/3-7-69-542.pdf","author":"Sharma G.","year":"2017","unstructured":"Sharma , G. ( 2017 ). Pros and Cons of Sampling Technique . International Journal of Applied Research. https:\/\/www.allresearchjournal.com\/archives\/2017\/vol3issue7\/PartK\/3-7-69-542.pdf Sharma, G. (2017). Pros and Cons of Sampling Technique. International Journal of Applied Research. https:\/\/www.allresearchjournal.com\/archives\/2017\/vol3issue7\/PartK\/3-7-69-542.pdf"},{"key":"e_1_3_2_1_10_1","volume-title":"Analysis of 21st Century Skills Integration as applied in the Philippines K to 12 program. Final Report","author":"Scoular C.","year":"2020","unstructured":"Scoular , C. ( 2020 ). Analysis of 21st Century Skills Integration as applied in the Philippines K to 12 program. Final Report . Australian Council for Educational Research . https:\/\/research.acer.edu.au\/curriculumdevelopment\/1. Scoular, C. (2020). Analysis of 21st Century Skills Integration as applied in the Philippines K to 12 program. Final Report. Australian Council for Educational Research. https:\/\/research.acer.edu.au\/curriculumdevelopment\/1."},{"key":"e_1_3_2_1_11_1","volume-title":"The Internet and Education. OpenMind. https:\/\/www.bbvaopenmind.com\/en\/articles\/the-internet-and-education\/","author":"Selwyn N.","year":"2013","unstructured":"Selwyn , N. ( 2013 ). The Internet and Education. OpenMind. https:\/\/www.bbvaopenmind.com\/en\/articles\/the-internet-and-education\/ Selwyn, N. (2013). The Internet and Education. OpenMind. https:\/\/www.bbvaopenmind.com\/en\/articles\/the-internet-and-education\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Information Security Awareness. Turkish Journal of Education, 2(17341). https:\/\/doi.org\/10.19128\/turje.181065","author":"Tekerek M.","year":"2015","unstructured":"Tekerek , M. , & Tekerek , A. ( 2015 ). A Research on Students \u2019 Information Security Awareness. Turkish Journal of Education, 2(17341). https:\/\/doi.org\/10.19128\/turje.181065 10.19128\/turje.181065 Tekerek, M., & Tekerek, A. (2015). A Research on Students\u2019 Information Security Awareness. Turkish Journal of Education, 2(17341). https:\/\/doi.org\/10.19128\/turje.181065"},{"key":"e_1_3_2_1_13_1","article-title":"Teachers\u2019 Level of Awareness of 21st Century Occupational Roles in Rivers State Secondary Schools","author":"Uche C. M.","year":"2016","unstructured":"Uche , C. M. , Kaegon , L. E. , & Okata , F. C. ( 2016 ). Teachers\u2019 Level of Awareness of 21st Century Occupational Roles in Rivers State Secondary Schools . Journal of Education and Training Studies, 4(8). https:\/\/doi.org\/10.11114\/jets.v4i8.1621 10.11114\/jets.v4i8.1621 Uche, C. M., Kaegon, L. E., & Okata, F. C. (2016). Teachers\u2019 Level of Awareness of 21st Century Occupational Roles in Rivers State Secondary Schools. Journal of Education and Training Studies, 4(8). https:\/\/doi.org\/10.11114\/jets.v4i8.1621","journal-title":"Journal of Education and Training Studies, 4(8). https:\/\/doi.org\/10.11114\/jets.v4i8.1621"},{"key":"e_1_3_2_1_14_1","volume-title":"Examining secondary school students","author":"Y\u0131lmaz R.","year":"2017","unstructured":"Y\u0131lmaz , R. , Karao\u011flan Y\u0131lmaz , F. G. , \u00d6 Zt\u00fcrk , H. T. , & Karademir , T. ( 2017 ). Examining secondary school students \u2019 safe computer and internet usage awareness: An example from Bart\u0131n province. Pegem E\u011fitim ve \u00d6\u011fretim Dergisi , 7(1), 83\u2013114. https:\/\/doi.org\/10.14527\/pegegog.2017.004 10.14527\/pegegog.2017.004 Y\u0131lmaz, R., Karao\u011flan Y\u0131lmaz, F. G., \u00d6Zt\u00fcrk, H. T., & Karademir, T. (2017). Examining secondary school students\u2019 safe computer and internet usage awareness: An example from Bart\u0131n province. Pegem E\u011fitim ve \u00d6\u011fretim Dergisi, 7(1), 83\u2013114. https:\/\/doi.org\/10.14527\/pegegog.2017.004"},{"key":"e_1_3_2_1_15_1","volume-title":"Philippines Towards Student Data Privacy and Its Legal Implications. https:\/\/papers.iafor.org\/submission42409\/","author":"Zamora J. C.","year":"2018","unstructured":"Zamora , J. C. , Tan , M. , Albacete , S. , & Canulo , R. (Eds.). ( 2018 ). An Analysis on the Perceptions of High School Teachers in Manila , Philippines Towards Student Data Privacy and Its Legal Implications. https:\/\/papers.iafor.org\/submission42409\/ Zamora, J. C., Tan, M., Albacete, S., & Canulo, R. (Eds.). (2018). An Analysis on the Perceptions of High School Teachers in Manila, Philippines Towards Student Data Privacy and Its Legal Implications. https:\/\/papers.iafor.org\/submission42409\/"}],"event":{"name":"IC4E 2022: 2022 13th International Conference on E-Education, E-Business, E-Management, and E-Learning","acronym":"IC4E 2022","location":"Tokyo Japan"},"container-title":["2022 13th International Conference on E-Education, E-Business, E-Management, and E-Learning (IC4E)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514262.3514278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3514262.3514278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:14Z","timestamp":1750183814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3514262.3514278"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,14]]},"references-count":15,"alternative-id":["10.1145\/3514262.3514278","10.1145\/3514262"],"URL":"https:\/\/doi.org\/10.1145\/3514262.3514278","relation":{},"subject":[],"published":{"date-parts":[[2022,1,14]]},"assertion":[{"value":"2022-04-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}