Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Teachers | 7 |
Internet | 4 |
Safety | 3 |
Social Networks | 3 |
Computer Networks | 2 |
Educational Technology | 2 |
Foreign Countries | 2 |
Information Technology | 2 |
Web Sites | 2 |
Administrators | 1 |
More ▼ |
Source
British Journal of… | 1 |
British Journal of… | 1 |
Journal of Cybersecurity… | 1 |
ProQuest LLC | 1 |
T.H.E. Journal | 1 |
Techniques: Connecting… | 1 |
Technology & Learning | 1 |
Author
Cavus, Nadire | 1 |
Couros, Alec | 1 |
Curby Alexander | 1 |
DeFranco, Joanna F. | 1 |
Ercag, Erinc | 1 |
Herbert C. Peluzzo Jr. | 1 |
Liran Ma | 1 |
Michael Adorjan | 1 |
Mohana Mukherjee | 1 |
Rosemary Ricciardelli | 1 |
Waters, John K. | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Dissertations/Theses -… | 1 |
Education Level
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Administrators | 1 |
Location
Canada | 1 |
Cyprus | 1 |
Nevada | 1 |
New Jersey | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Curby Alexander; Liran Ma; Ze-Li Dou; Zhipeng Cai; Yan Huang – Journal of Cybersecurity Education, Research and Practice, 2024
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality…
Descriptors: Students, Teachers, Inquiry, Computer Security
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Michael Adorjan; Rosemary Ricciardelli; Mohana Mukherjee – British Journal of Educational Studies, 2024
Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative…
Descriptors: Computer Security, Restorative Practices, Bullying, Computer Mediated Communication
Cavus, Nadire; Ercag, Erinc – British Journal of Educational Technology, 2016
There has been an increase in the vulnerability in Internet security, and the unconscious usage of the Internet is a very important issue throughout the world as it is in Cyprus today. The best way to solve such an issue would be to make people aware of this situation. Based on this idea, teachers should firstly be trained to use the Internet in a…
Descriptors: Foreign Countries, Self Efficacy, Internet, Safety
DeFranco, Joanna F. – Techniques: Connecting Education and Careers (J1), 2011
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Descriptors: Management Systems, Safety, Internet, Teachers
Couros, Alec – Technology & Learning, 2008
The various scandals around social networking abuses have garnered lots of press in the past couple of years. Predators, bullying, slander, and harassment of all kinds on sites such as MySpace and Facebook are increasingly the subjects of horror stories and play into a renewed wave of fear about the dangers online. However, once the fear of safety…
Descriptors: Safety, Social Networks, Web Sites, Student Responsibility
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security