| Literature DB >> 33644780 |
Abstract
With the increased level of technology usage in schools and the move to online learning, many schools had to re-evaluate the content of their cyber-safety policy and review it to ensure it works within and beyond the schools' premises. This study aimed to analyse the cyber-safety policies of twenty private schools in Dubai, an emirate in the United Arab Emirates (UAE). Five main categories were considered for the content analysis of the policy documents including definitions, preventive measures, reporting and responding to incidents, connection to other policies and mention of existing legislation. Upon the analysis of the policy documents, it was found that while some addressed cyber-safety issues, the focus remained more on cyberbullying incidents. Besides, the development of the cyber-safety policies is lacking the input from the concerned authorities whose ultimate responsibility is to develop the major policies and guidelines to be adopted by schools. © Association for Educational Communications & Technology 2021.Entities:
Keywords: Cyber-safety; Cyberbullying; Education; Policy
Year: 2021 PMID: 33644780 PMCID: PMC7899622 DOI: 10.1007/s11528-021-00595-8
Source DB: PubMed Journal: TechTrends ISSN: 1559-7075
Devised list for the components of a cyber-safety policy
| Categories/Elements | Description | Reference | |
|---|---|---|---|
| A | Definitions (4 items) | ||
| 1 | Includes Cyber-Safety definition | The definition includes the protection of the user and its assets from any online threats through various measures such as promoting cyber safe behaviours as well as management measures. | (Independent Education Union |
| 2 | Includes Cyberbullying definition | The definition includes the repetition of an action and the intention to cause harm. | (Chalmers et al. |
| 3 | Includes a list of cyber-risks forms | Includes, but is not limited to, phishing, data and identity theft, infection of systems by malware, cyber sexual predation, exposure to inappropriate content, and cyberbullying. | (Independent Education Union |
| 4 | Includes a list of cyberbullying forms | Includes, but is not limited to, exclusion or peer rejection, harassment, or ‘cyberstalking’, outing, impersonation and fake profiles. | (Independent Education Union |
| B | Preventive Measures (5 items) | ||
| 1 | Mentions policy relation to curriculum | Mentions the integration of cyber-safety education into existing or special units of study. | (Chalmers et al. |
| 2 | Mentions policy relation to schools’ activities (i.e., assemblies, bulletins) | Mentions the preventative role of cyber-safety promotion through means outside the curriculum such as morning assemblies, magazines, and drama presentations. | (de Lange and von Solms |
| 3 | Mentions Professional Development or training for Staff | Discusses if or how teachers will receive professional development about their rights and responsibilities, how and when to apply the policy, and how they are expected to deliver the education programs related to the policy. (“professional development for teachers” is sufficient if it clearly refers to cyber-safety training) | (Chalmers et al. |
| 4 | Mentions communicating updates with stakeholders | Discusses how the schools will continuously communicate updates regarding what is expected and acceptable to all stakeholders (teachers, parents, students). | (de Lange and von Solms |
| 5 | States students code of conduct regarding cyber-safety inside the school | Mentions how students are expected to behave online. This includes cyber-safety practices such as password security, as well as accepted online behaviour. | (Foody et al. |
| C | Reporting and Responding to incidents (7 items) | (Chalmers et al. | |
| 1 | Mention of the extent of the school concerns of incidents happening outside the school’s hours | Clarifies that the policy applies to all cyber-security issues, including those happening outside the school physical boundaries. | (Brown et al. |
| 2 | States what victims or witnesses of cyberattacks and cyberbullying should do | E.g., report to a teacher | (Chalmers et al. |
| 3 | States how teaching staff should respond to a report of cyberbullying or cyberattack | More specific than just “deal promptly”. | (Independent Education Union |
| 4 | States how parents should respond and report a cyberattack | E.g., save any offending material and contact the students’ counsellor. | (Foody et al. |
| 5 | Mentions how incidents will be handled and followed up | Include the procedures that will be implemented in different situations and according to the intensity of the offense and how the incident will be followed up. | (Chalmers et al. |
| 6 | Mentions procedures to maintain logs. | States that report of incidents will be recorded. | (Foody et al. |
| 7 | Mentions how or if victims will be supported | States that victims will be supported. | (Foody et al. |
| D | Connection to other policies (4 items) | ||
| 1 | Refers to electronic device usage agreement | Demonstrate links, or includes electronic device usage agreement or policies. | (Independent Education Union |
| 2 | Refers to discipline and behaviour policies | Demonstrate links to existing school’s behaviour or discipline policies. | (Independent Education Union |
| 3 | Refers to anti-bullying policy | Demonstrates links, or includes traditional anti-bullying policies. | (Independent Education Union |
| 4 | Refers to safeguarding and child-protection policy | Demonstrates links to safeguarding and child-protection policies. | (Independent Education Union |
| E | Mention of Existing Legislation (2 items) | ||
| 1 | Refers to cyber laws | Refers, at least implicitly, to any of the UAE Cyber Crimes Laws (2012, Available at: | (Independent Education Union |
| 2 | Refers to Privacy/Digital Content Laws | Refers, at least implicitly, to the UAE Internet Access Management regulatory policy (2017) (UAE Government | (Independent Education Union |
Mean scores and Standard Deviation (SD) for each category (A. B. C, D and E), and for total cyber-safety content, and for each of the 22 elements as percentages
| A | Definitions (4 items) | Mean = 1.55 SD = 0.94 |
| 1 | Includes Cyber-Safety definition | 20% |
| 2 | Includes Cyberbullying definition | 25% |
| 3 | Includes a list of cyber-risks forms | 20% |
| 4 | Includes a list of cyberbullying forms | 90% |
| B | Preventive Measures (5 items) | Mean = 2.8 SD = 1.51 |
| 1 | Mentions policy relation to curriculum | 75% |
| 2 | Mentions policy relation to schools’ activities (e.g., assemblies, bulletins) | 70% |
| 3 | Mentions Professional Development or training for Staff | 35% |
| 4 | Mentions communicating updates with stakeholders | 30% |
| 5 | States students code of conduct regarding cyber-safety inside the school | 70% |
| C | Reporting and Responding to incidents (7 items) | Mean = 5.15 SD = 1.14 |
| 1 | Mention of the extent of the school concerns of incidents happening outside the school’s hours | 50% |
| 2 | States what victims or witnesses of cyberattacks and cyberbullying should do | 90% |
| 3 | States how teaching staff should respond to a report of cyberbullying or cyberattack | 80% |
| 4 | States how parents should respond and report a cyberattack | 85% |
| 5 | Mentions how incidents will be handled and followed up | 25% |
| 6 | Mentions procedures to maintain logs. | 40% |
| 7 | Mentions how or if victims will be supported | 80% |
| D | Connection to other policies (4 items) | Mean = 2.3 SD = 1.22 |
| 1 | Refers to electronic device usage agreement | 50% |
| 2 | Refers to discipline and behaviour policies | 60% |
| 3 | Refers to anti-bullying policy | 70% |
| 4 | Refers to safeguarding and child-protection policy | 50% |
| E | Mention of Existing Legislation (2 items) | Mean = 0.8 SD = 0.77 |
| 1 | Refers to cyber laws | 60% |
| 2 | Refers to Privacy/Digital Content Laws | 20% |
| Total 22 item | Mean = 12.6 SD = 2.50 | |