Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 16 |
Descriptor
Computers | 40 |
Privacy | 40 |
Internet | 17 |
Higher Education | 15 |
Computer Security | 13 |
Information Technology | 11 |
Computer Software | 7 |
Information Storage | 7 |
Computer Networks | 6 |
Confidential Records | 6 |
Ethics | 6 |
More ▼ |
Source
Author
Bergren, Martha Dewey | 2 |
Panettieri, Joseph C. | 2 |
Aarsand, Pal Andre | 1 |
Alexander, Bryan | 1 |
Aronsson, Karin | 1 |
Ashour, Rateb | 1 |
Basham, Matt | 1 |
Bird, Robert C. | 1 |
Bristow, Rob | 1 |
Buckman, Joel | 1 |
Curran, Robert F. | 1 |
More ▼ |
Publication Type
Journal Articles | 40 |
Reports - Descriptive | 20 |
Opinion Papers | 11 |
Guides - Non-Classroom | 2 |
Reports - General | 2 |
Information Analyses | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 11 |
Elementary Secondary Education | 3 |
Postsecondary Education | 2 |
Adult Education | 1 |
Audience
Administrators | 2 |
Practitioners | 2 |
Media Staff | 1 |
Location
Ohio | 2 |
United Kingdom | 2 |
Australia | 1 |
California | 1 |
Canada | 1 |
Georgia | 1 |
Indiana | 1 |
Jordan | 1 |
Massachusetts | 1 |
Netherlands | 1 |
South Carolina | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 4 |
Copyright Law 1976 | 1 |
Equal Access | 1 |
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Guerry, Richard – Education Digest: Essential Readings Condensed for Quick Review, 2012
Most discussions about keeping kids safe online center around two issues: (1) With the rapid development and dissemination of digital technology, how can we stay ahead of what our students are doing?; and (2) What controls are available to prevent students from visiting inappropriate sites? These are reasonable questions, but they ignore two…
Descriptors: Internet, Accountability, Bullying, Computers
Mantiri, Franky – Universal Journal of Educational Research, 2014
This essay explores the use of computer technology and multimedia in students learning. Undoubtedly, the advent of computer technology has changed the way humans learn and do things. Moreover, "Computer has become standard equipment" (Bitter & Pierson, 2002) in everyday life. The ability to process data in a real time has helped…
Descriptors: Technology Uses in Education, Multimedia Materials, Information Technology, Computers
DeFranco, Joanna F. – Techniques: Connecting Education and Careers (J1), 2011
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Descriptors: Management Systems, Safety, Internet, Teachers
Iyadat, Waleed; Iyadat, Yousef; Ashour, Rateb; Khasawneh, Samer – E-Learning and Digital Media, 2012
The primary purpose of this study was to determine the level of students' awareness about computer technology ethics at the Hashemite University in Jordan. A total of 180 university students participated in the study by completing the questionnaire designed by the researchers, named the Computer Technology Ethics Questionnaire (CTEQ). Results…
Descriptors: Computers, Privacy, Foreign Countries, Ethics
Buckman, Joel; Gold, Stephanie – College and University, 2012
This article outlines privacy and data security compliance issues facing postsecondary education institutions when they utilize cloud computing and concludes with a practical list of do's and dont's. Cloud computing does not change an institution's privacy and data security obligations. It does involve reliance on a third party, which requires an…
Descriptors: Higher Education, Computers, Information Security, Privacy
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Aarsand, Pal Andre; Aronsson, Karin – Childhood: A Global Journal of Child Research, 2009
This article examines territorial negotiations concerning gaming, drawing on video recordings of gaming practices in middle-class families. It explores how private vs public gaming space was co-construed by children and parents in front of the screen as well as through conversations about games. Game equipment was generally located in public…
Descriptors: Children, Adolescents, Time Management, Computers
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security

McIntyre, Tom; Tong, Virginia M.; Perez, Joseph F. – Journal of Correctional Education, 2001
Outlines concerns about Internet use by incarcerated youth such as use of e-mail for criminal activity and privacy and censorship of online communications. Gives guidelines for Internet use that would address concerns while giving these youth access to the educational advantages of the technology. (SK)
Descriptors: Adolescents, Computers, Correctional Education, Internet

White, Peter – International Library Review, 1980
Explores the nature of privacy with regard to information about the individual and reviews governmental legislation affecting confidentiality in the United States, the United Kingdom, Canada, and Australia, focusing particularly on the role of computers and the library. (FM)
Descriptors: Computers, Confidential Records, Confidentiality, Legislation
Samuels, Dorothy J. – USA Today, 1984
The federal government, credit bureaus, banks, and insurance and telephone companies all maintain files on clients. Once available, the temptation to use information on file is often irresistible. In terms of personal privacy, the most frightening development is the growth of computer-matching programs, where two agencies check each others' files.…
Descriptors: Civil Liberties, Computers, Confidential Records, Data Collection