Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 7 |
Teachers | 7 |
Educational Technology | 3 |
Internet | 3 |
Safety | 3 |
Social Networks | 3 |
Computer Software | 2 |
Computer Uses in Education | 2 |
Foreign Countries | 2 |
Web Sites | 2 |
Access to Computers | 1 |
More ▼ |
Source
Technology & Learning | 2 |
British Journal of… | 1 |
British Journal of… | 1 |
Journal of Cybersecurity… | 1 |
T.H.E. Journal | 1 |
Techniques: Connecting… | 1 |
Author
Cavus, Nadire | 1 |
Couros, Alec | 1 |
Curby Alexander | 1 |
DeFranco, Joanna F. | 1 |
Ercag, Erinc | 1 |
Fryer, Wesley | 1 |
Liran Ma | 1 |
Michael Adorjan | 1 |
Mohana Mukherjee | 1 |
Rosemary Ricciardelli | 1 |
Waters, John K. | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Opinion Papers | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Curby Alexander; Liran Ma; Ze-Li Dou; Zhipeng Cai; Yan Huang – Journal of Cybersecurity Education, Research and Practice, 2024
Recent advances in Artificial Intelligence (AI) have brought society closer to the long-held dream of creating machines to help with both common and complex tasks and functions. From recommending movies to detecting disease in its earliest stages, AI has become an aspect of daily life many people accept without scrutiny. Despite its functionality…
Descriptors: Students, Teachers, Inquiry, Computer Security
Michael Adorjan; Rosemary Ricciardelli; Mohana Mukherjee – British Journal of Educational Studies, 2024
Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative…
Descriptors: Computer Security, Restorative Practices, Bullying, Computer Mediated Communication
Cavus, Nadire; Ercag, Erinc – British Journal of Educational Technology, 2016
There has been an increase in the vulnerability in Internet security, and the unconscious usage of the Internet is a very important issue throughout the world as it is in Cyprus today. The best way to solve such an issue would be to make people aware of this situation. Based on this idea, teachers should firstly be trained to use the Internet in a…
Descriptors: Foreign Countries, Self Efficacy, Internet, Safety
DeFranco, Joanna F. – Techniques: Connecting Education and Careers (J1), 2011
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Descriptors: Management Systems, Safety, Internet, Teachers
Couros, Alec – Technology & Learning, 2008
The various scandals around social networking abuses have garnered lots of press in the past couple of years. Predators, bullying, slander, and harassment of all kinds on sites such as MySpace and Facebook are increasingly the subjects of horror stories and play into a renewed wave of fear about the dangers online. However, once the fear of safety…
Descriptors: Safety, Social Networks, Web Sites, Student Responsibility
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Fryer, Wesley – Technology & Learning, 2004
There has long been a power struggle between techies and teachers over classroom computer desktops. IT personnel tend to believe allowing "inept" educators to have unfettered access to their computer's hard drive is an open invitation for trouble. Conversely, teachers often perceive tech support to be "uncaring" adversaries standing in the way of…
Descriptors: Teachers, Educational Innovation, Computer Software, Computer Uses in Education