NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Marta Estellés; Andrew Doyle – Review of Education, 2025
Over the last two decades, online safety education has emerged as a new field of research focusing on concerns about a myriad of cyber risks. These risks range from online sexual exploitation through to the reproduction of social inequalities. The main assumption underlying this field is that online risks can be mitigated via educational…
Descriptors: Literature Reviews, Safety Education, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Eun Ok Baek; Romina Villaflor Wilson – International Journal of Adult Education and Technology, 2024
The emergence of generative AI technologies has provoked considerable debate among educators regarding their role in education. This study is an investigation of the benefits, disadvantages, and potential strategies for integrating generative AI in educational settings by analyzing societal impacts based on a literature review. We have surveyed…
Descriptors: Artificial Intelligence, Technology Uses in Education, Information Technology, Educational Strategies
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Febro-Naga, January-D.; Tinam-isan, Mia-Amor-C. – Comunicar: Media Education Research Journal, 2022
Violence against women and girls (VAWG) is not a recent phenomenon. What is new is the additional increasing threats that millions of women and girls face because of the rapid spread of ICTs and the expansion of social media. Cases of VAWG wherein ICT and social media are used as platforms by cybercriminals can be seen in the news media coverage.…
Descriptors: Foreign Countries, Violence, Gender Bias, Females
Graafland, Julie Hooft – OECD Publishing, 2018
This paper provides a synthesis of the literature on and recent trends in new technologies and its effect on 21st century children (0-18 years old). It begins by providing an overview of recent trends in the access and use of new technologies as well as a summary of online opportunities and risks. It then explores a variety of factors, including…
Descriptors: Technology Uses in Education, Technological Advancement, Web 2.0 Technologies, Elementary Secondary Education
Peer reviewed Peer reviewed
Government Information Quarterly, 1992
The increased use of computer matching to detect fraud and abuse in government programs has led to concerns for the privacy of personal information. Reviews the use of matching programs and regulations in Canada, the United States, and the European Community, and suggests policy changes. (80 references) (LAE)
Descriptors: Confidential Records, Federal Regulation, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Halachmi, Arie – Public Personnel Management, 1992
The dysfunctions associated with artificial workgroups require attention to the social context of work. Complex issues of safety and security related to information technology may necessitate a new classification of experts, information rangers, with policing and investigative authority. (SK)
Descriptors: Information Technology, Interprofessional Relationship, Morale, Occupational Safety and Health
Peer reviewed Peer reviewed
Petersen, Rodney J.; Hodges, Marjorie W. – New Directions for Student Services, 1997
Summarizes legal issues that pertain to the uses of information technology on campuses. Highlights privacy, freedom of expression, and intellectual property rights. Argues that understanding these legal and ethical issues is necessary in developing an appropriate campus policy. Provides guidance for developing a campus technology policy. (RJM)
Descriptors: Civil Liberties, Computer Uses in Education, Disclosure, Ethics
Garson, G. David – 1995
Computing involves social issues and political choices. Issues such as privacy, computer crime, gender inequity, disemployment, and electronic democracy versus "Big Brother" are addressed in the context of efforts to develop a national public policy for information technology. A broad range of research and case studies are examined in an…
Descriptors: Case Studies, Civil Liberties, Computer Security, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
National Association of State Universities and Land Grant Colleges, Washington, DC. – 1995
This publication details the critical issues being debated in telecommunications today and their impact on colleges and universities in the future. An introduction identifies important changes in recent years including technological advances, the digitizing of communication, privatization and commercialization of the Internet, possible significant…
Descriptors: Access to Information, Distance Education, Economic Factors, Federal Legislation