Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Alberta Education | 1 |
British Journal of… | 1 |
Computers in Libraries | 1 |
Journal of Cybersecurity… | 1 |
OCLC Online Computer Library… | 1 |
T.H.E. Journal | 1 |
Author
Adesina, Omolayo A. | 1 |
Kutty, Ashwin | 1 |
Michael Adorjan | 1 |
Mohana Mukherjee | 1 |
Nikkel, Terry | 1 |
Opesade, Adeola O. | 1 |
Rosemary Ricciardelli | 1 |
Storey, Tom, Ed. | 1 |
Waters, John K. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Research | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Numerical/Quantitative Data | 1 |
Education Level
Higher Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Location
Canada | 7 |
Germany | 2 |
United Kingdom | 2 |
United States | 2 |
Alabama | 1 |
Australia | 1 |
Austria | 1 |
Belgium | 1 |
China | 1 |
Finland | 1 |
France | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Michael Adorjan; Rosemary Ricciardelli; Mohana Mukherjee – British Journal of Educational Studies, 2024
Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative…
Descriptors: Computer Security, Restorative Practices, Bullying, Computer Mediated Communication
Opesade, Adeola O.; Adesina, Omolayo A. – Journal of Cybersecurity Education, Research and Practice, 2020
The use of the Internet among children and adolescents is now a norm in many parts of the world. As the Internet offers a wide range of benefits to these ones, so does it expose them to possible various risks and harm. Researchers in different countries across the world have engaged in the production of relevant research-based knowledge in order…
Descriptors: Internet, Computer Security, Information Security, Children
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
Nikkel, Terry; Kutty, Ashwin – Computers in Libraries, 2004
Dalhousie is a medium-sized university, with about 15,000 FTE students, located in Halifax, Nova Scotia. It is one of Canada's oldest and most prestigious universities, yet, like many other public institutions, it frequently suffers from a lack of adequate funding to fulfill all the conflicting needs of the various faculties and departments. This…
Descriptors: Foreign Countries, Research Libraries, Internet, Library Services
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software