Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 37 |
Descriptor
Source
Author
Berson, Ilene R. | 2 |
Berson, Michael J. | 2 |
Descy, Don E. | 2 |
Bahr, Ellen | 1 |
Barrett, Joanne | 1 |
Bleimann, U. | 1 |
Brown, Abbie | 1 |
Brown, David S. | 1 |
Capus, Laurence | 1 |
Coogan, John F. | 1 |
Furnell, S. M. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 46 |
Journal Articles | 37 |
Books | 4 |
Guides - Classroom - Teacher | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 9 |
Higher Education | 9 |
Postsecondary Education | 5 |
High Schools | 2 |
Elementary Education | 1 |
Grade 10 | 1 |
Grade 11 | 1 |
Grade 12 | 1 |
Grade 9 | 1 |
Middle Schools | 1 |
Secondary Education | 1 |
More ▼ |
Audience
Media Staff | 2 |
Students | 2 |
Teachers | 2 |
Administrators | 1 |
Parents | 1 |
Location
California | 3 |
Arizona | 1 |
Colorado | 1 |
Germany | 1 |
Kansas | 1 |
Maine | 1 |
Maryland | 1 |
Texas | 1 |
United Kingdom | 1 |
United States | 1 |
Washington | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
Sussman, Lori L. – Journal of Cybersecurity Education, Research and Practice, 2023
The Cybersecurity Ambassador Program provides professional skills training for emerging cybersecurity professionals remotely. The goal is to reach out to underrepresented populations who may use Federal Work-Study (FWS) or grant sponsored internships to participate. Cybersecurity Ambassadors (CAs) develop skills that will serve them well as…
Descriptors: Computer Security, Information Security, Internet, Computer Mediated Communication
Coogan, John F. – Journal of Electronic Resources Librarianship, 2019
Resolving user access issues is inherent in managing electronic resources in libraries. The University of Maryland University College (UMUC) Library, situated within a predominantly distance learning-centered institution, has developed a series of web-based technical help pages to facilitate resolution of typical issues reported by its…
Descriptors: Access to Information, Users (Information), Information Management, Technical Support
Hoefling, Trina – Stylus Publishing LLC, 2017
Remote working is the new reality, and transactional work--provided by freelancers, contract employees or consultants--has increased exponentially. It is forecast that as much as half the labor force will be working independently and virtually by 2020. Most organizations are still grappling with how to effectively manage their virtual staff and…
Descriptors: Technological Literacy, Teamwork, Computer Mediated Communication, Communications
Kyriacou, Chris; Zuin, Antônio – Pastoral Care in Education, 2018
One of the new challenges facing pastoral care in schools is dealing with the rapid growth of cyberbullying by school-aged children. Within digital cyberspace, cyberbullies are finding more opportunities to express their aggression towards others as social networks become technologically more sophisticated. An important feature of cyberbullying is…
Descriptors: Bullying, Moral Values, Caring, Computer Security
Berson, Michael J.; Berson, Ilene R. – Social Education, 2014
Educators have been increasingly sensitized to the role of schools in developing students' cyberethics, cybercitizenship, and cybersafety, which have emerged as one of the most pressing and yet unexplored areas of education. The Department of Defense has identified challenges to cybersecurity infrastructure as a significant risk for the…
Descriptors: Bullying, Computer Mediated Communication, School Role, School Safety
PACER Center, 2013
If the word "bullying" makes you think of one child picking on another in the schoolyard, it is time to update your image of how students bully. While the face-to-face harassment certainly still exists, new ways of bullying have emerged. With the easy access to cell phones, instant messaging, mobile devices, social networking websites,…
Descriptors: Bullying, Computer Mediated Communication, Telecommunications, Internet
Guerry, Richard – Education Digest: Essential Readings Condensed for Quick Review, 2012
Most discussions about keeping kids safe online center around two issues: (1) With the rapid development and dissemination of digital technology, how can we stay ahead of what our students are doing?; and (2) What controls are available to prevent students from visiting inappropriate sites? These are reasonable questions, but they ignore two…
Descriptors: Internet, Accountability, Bullying, Computers
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Mohanna, Mahmoud; Capus, Laurence – International Association for Development of the Information Society, 2013
This paper presents a mobile learning application for a learning course at higher education level. Based on the RSS feed technology, the presented mobile application establishes an in-time communication channel between the instructor and his/her students to keep them up-to-date with all course important dates, instructions and information in…
Descriptors: Technology Uses in Education, Educational Technology, Electronic Learning, Telecommunications
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Willard, Nancy – Corwin, 2012
Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…
Descriptors: Child Safety, Computers, Internet, Secondary School Students
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
Descriptors: Internet, Computer Mediated Communication, Privacy, Computer Security
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Ross, Derek G. – Journal of Technical Writing and Communication, 2009
Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters--modern perversions of "ars dictaminis" (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the…
Descriptors: Letters (Correspondence), Rhetoric, Rhetorical Criticism, Electronic Mail
Linworth, 2012
If you're new to running a library or looking for a refresher, this book can serve as your first reference source for school library operation, providing overview information on a wealth of topics, lists of resources for more in-depth information, and coverage of current topics such as Web 2.0, fundraising, digital booktalks, and cybersafety.…
Descriptors: Fund Raising, Library Administration, School Libraries, Library Automation