Publication Date
In 2025 | 1 |
Since 2024 | 5 |
Since 2021 (last 5 years) | 7 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 17 |
Descriptor
Source
Author
Anderson, Alicia | 1 |
Ayfer Beylik | 1 |
Baris Yigit | 1 |
Cigularova, Daniela | 1 |
Costanzo, John | 1 |
Das, Santwana | 1 |
Esra Pinar Uça Günes | 1 |
Fan, Andy | 1 |
Franz, Dana Pomykal | 1 |
Frolick, Mark N. | 1 |
Garland, Virginia E. | 1 |
More ▼ |
Publication Type
Journal Articles | 24 |
Reports - Descriptive | 10 |
Reports - Research | 9 |
Opinion Papers | 2 |
Reports - Evaluative | 2 |
Collected Works - Serial | 1 |
Information Analyses | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 11 |
Postsecondary Education | 8 |
Elementary Secondary Education | 3 |
Secondary Education | 2 |
Elementary Education | 1 |
Middle Schools | 1 |
Audience
Administrators | 2 |
Teachers | 2 |
Parents | 1 |
Students | 1 |
Location
United Kingdom | 2 |
Albania | 1 |
China | 1 |
Colorado | 1 |
India | 1 |
Indonesia | 1 |
Macau | 1 |
North Korea | 1 |
South Africa | 1 |
Sweden | 1 |
Tanzania | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Payne, Brian; Cigularova, Daniela; Costanzo, John; Das, Santwana; Mann, Michael; Perez, Kimberly – Community College Journal of Research and Practice, 2022
Cybersecurity education has grown exponentially over the past decade. This growth occurred at all levels of education -- from high schools to community colleges to four-year universities. At the same time, renewed interest in helping students transfer between higher education institutions has resulted in calls from policy makers and higher…
Descriptors: Articulation (Education), College Transfer Students, Institutional Cooperation, Computer Security
Esra Pinar Uça Günes; Nuray Gedik; Mehmet Ali Isikoglu; Baris Yigit; Ihsan Günes; Ayfer Beylik – Open Praxis, 2024
The primary objective of this manuscript is to examine the online assessment and exam security procedures during the pandemic, with a particular focus on higher education. In this context, the study investigates the measures employed by instructors, the challenges they encountered, and the strategies they employed to overcome these challenges in a…
Descriptors: Tests, Distance Education, Supervision, COVID-19
Susanne Walan – International Journal of Technology and Design Education, 2025
Since the end of 2022, global discussions on Artificial Intelligence (AI) have surged, influencing diverse societal groups, such as teachers, students and policymakers. This case study focuses on Swedish primary school students aged 11-12. The aim is to examine their cognitive and affective perceptions of AI and their current usage. Data,…
Descriptors: Foreign Countries, Elementary School Students, Artificial Intelligence, Student Attitudes
Hans Kaushik; Smriti Kaushik – Education and Information Technologies, 2024
The involvement of technology in the education domain has transformed the traditional system in many countries. The need was realized when 300 million students in India itself were pushed to move from traditional to various digital education platforms during the pandemic. There has been an essential emphasis given to the promotion of digital based…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Technology Uses in Education
Paige Kowalski – State Education Standard, 2024
Everyone who uses student information has a responsibility to maintain students' privacy and the security of their data. Ensuring student data privacy is about so much more than complying with the Family Educational Rights and Privacy Act (FERPA). While privacy must be top of mind when thinking about collecting and using personally identifiable…
Descriptors: State Boards of Education, State Agencies, Public Education, Privacy
Prasetiyo, Wibowo Heru; Naidu, Noor Banu Mahadir; Tan, Bee Piang; Sumardjoko, Bambang – International Journal of Evaluation and Research in Education, 2021
The surge of information in the digital age has impacted social problems. Accordingly, digital citizenship had been discussed mostly within topics related to digital security, IT education. A systematic review is needed to provide an overview for educators and policymakers in Indonesia to address ethical and technical issues to improve the online…
Descriptors: Technological Literacy, Educational Technology, Online Courses, Technology Uses in Education
Hamisi Mfaume; Margareth Bilinga – Journal of Learning for Development, 2024
The invention of digital ICT devices is one of the most important developments in the history of humankind, and education can greatly benefit from it. However, cyber ethics violations by teachers have become prevalent and are expected to increase unless measures are taken. This study explored education stakeholders' perspectives on ways to promote…
Descriptors: Foreign Countries, Secondary School Teachers, Stakeholders, Computer Security
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Ramorola, M. Z. – Africa Education Review, 2013
South African teachers are faced with challenges in integrating technology effectively into a coherent framework at school level. There seems to be little evidence of technology integration into classroom activities such as systematic planning and implementation of lessons that require learners to think critically, work collaboratively, and use…
Descriptors: Teaching Methods, Technology Integration, Secondary School Teachers, Secondary School Students
Miller, Nicole C.; Thompson, Nicole L.; Franz, Dana Pomykal – Middle School Journal (J3), 2009
Schools should be proactive rather than reactive to issues of technology safety, and this requires careful planning and policy implementation. In this article, the authors provide information and recommendations that will help middle grades educators, students, and parents to safely and successfully manage the many technologies they encounter and…
Descriptors: Middle Schools, Middle School Students, Early Adolescents, Educational Technology
Hoff, Dianne L.; Mitchell, Sidney N. – Journal of Educational Administration, 2009
Purpose: The purpose of this paper is to present research exploring the pervasiveness and causes of cyberbullying, the psychological impact on students, and the responses to cyberbullying from students and administrators. The goal is to give school leaders a greater understanding of this phenomenon and suggest steps to deal with this challenging…
Descriptors: Student Attitudes, Educational Policy, Bullying, Computer Security
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Garland, Virginia E. – Journal of Educational Technology Systems, 2010
What is the school principal's role in ensuring ethical technology use while promoting the use of wireless and advanced technologies in instruction? The rapid advances in technology in only the past 5 years, including the increase in laptops and smart phones, have transformed both educational practices and the role of the school principal as…
Descriptors: Educational Practices, Moral Issues, Student Diversity, Ethics
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
Huber, Joe – Library Media Connection, 2005
Desktop security is the foundation of your overall security plan in K-12 education. National Educational Technology Standards (NETS) mainly states that students at all grade levels should know to make changes in the default settings for the operating system and its applications.
Descriptors: Elementary Secondary Education, Educational Technology, Educational Policy, Computer Security
Previous Page | Next Page »
Pages: 1 | 2