Verified Document

Internet Use Posting Personal Information Research Proposal

Included among the demographic data to be collected are: age and sex of the student, the type of school (private or public), the nature of internet access most frequently used (home, public library, school, others), primary guardian and relationship to the guardian (parent, grandparent, sister, etc.). A simple t-test will determine whether there is a significant difference in the frequency of posting scores between boys and girls or the 11-12 and 13-14 yr age groups. Frequency scores of Internet access location, relative availability of Internet access, and website types where personal information is posted will be compared using simple analysis of variance.

I can be varied depending on the youth population of the covered area

References

Berson, I. And Berson, M. (2005). Challenging online behaviors of youth: Findings from a comparative analysis of young people in the United States and New Zealand. Social Science...

Retrieved February 5, 2009, from Academic Research Library database. (Document ID: 788934721).
Fleming, M., Greentree, S., Muller, D.C., Elias, K., & Morrison, S. (2006). Safety in Cyberspace: Adolescents' Safety and Exposure Online. Youth and Society, 38(2), 135. Retrieved February 6, 2009, from Academic Research Library database. (Document ID: 1165576801).

Hertzel, D. (2000). Don't talk to strangers: An analysis of government and industry efforts to protect a child's privacy online. Federal Communications Law Journal, 52(2), 429-451. Retrieved February 5, 2009, from ABI/INFORM Global database. (Document ID: 50709727).

Sample Questions for the Survey

1. Where do you have Internet access for most times?

a. home b. school c. public library d. Internet shops/cafes

2. Are you able to access the Internet a. anytime of the day, everyday? d. A few days a week?

b. oftentimes a day, everyday? e. less than once a week c. A few hours a day, everyday?

Responses to questions 3 & 4 will be recorded using a 4-point scale where 0 = never, 1 = sometimes, 2 = often, 3 = just about every time

3. Do you visit websites or chat rooms that ask you to post personal information like your name, birthday, home address, school, email address, and telephone/mobile number?

4. Do you post personal information like your name, birthday, home address, school, email address, and telephone/mobile number online?

If you answered "Never" to Question 4, then you don't have to answer question 5

5. How many times a week do you post personal information online?

a. I don't post every week, but at least once a month c. 3-4 times a week b. 1-2 times a week d. just about everyday

Cite this Document:
Copy Bibliography Citation

Related Documents

CEO Memo on Internet Use
Words: 2628 Length: 8 Document Type: Essay

consultation done for a CEO of a Fortune 500 company regarding use of internet by its employees. The consultation will look into internet usage by employees and possible ways to reduce illegal use of internet at the workplace. Torts that the employees might be committing using the Workplace Internet There are quite a number of torts that could be committed by employees at the workplace. Quite a number of legal cases

Internet Searching for Information on Google Is
Words: 596 Length: 2 Document Type: Essay

Internet Searching for information on Google is like trying to find a needle in a haystack. Is that true? Was the library of the 19th century more efficient? Explain. Google makes searching easy by typing in search terms in the browser. When search terms are searched in the browser, it brings up a list of items from the search terms. This makes the searching in Google much easier to find what the

Internet Vulnerability in Today's Fast
Words: 1376 Length: 4 Document Type: Term Paper

Some programs are even able to track keystrokes and take snapshots of computer screens, allowing criminals even more information, such as credit card numbers and usernames (Bahl, 219). While the obtaining of information through fraud is a problem related to Internet activity, there are other concerns with privacy that are still considered legal. For example, a company can obtain your personal information from transactions, and legally sell that information to

Internet Fraud
Words: 4362 Length: 12 Document Type: Term Paper

Internet Fraud The slashing of prices of Home PCs and explosive growth of internet has increased the number of net users over the years. The keenness to exploit the advanced features of internet to utilize in the field of education, entertainment, communication, business, scientific research increased to a great extent. The wiping out of the geographical barriers is the greatest advantage that is provided by the internet which impels the net

Information Systems & Information Technology
Words: 3130 Length: 10 Document Type: Essay

The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into

Internet Personal Jurisdiction
Words: 7328 Length: 20 Document Type: Term Paper

Internet Personal Jurisdiction Normally, when the belongings are attached to a state, the courts are given authority over any assets actually present within the regional limits of the state and courts are also given authority on anyone provided with procedure while present actually within the region of that state. Checking of procedure and attachments are official methods for declaring personal authority over people or belongings and it also helps in the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now