Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Child Safety | 5 |
Computer Software | 5 |
Internet | 3 |
Adolescents | 2 |
Computer Mediated… | 2 |
Information Security | 2 |
Information Technology | 2 |
School Safety | 2 |
Sexuality | 2 |
Telecommunications | 2 |
Access to Computers | 1 |
More ▼ |
Source
Curriculum Review | 1 |
Readiness and Emergency… | 1 |
T.H.E. Journal | 1 |
TechTrends: Linking Research… | 1 |
Universal Journal of… | 1 |
Publication Type
Reports - Descriptive | 5 |
Journal Articles | 4 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Audience
Location
European Union | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
Cyber threats can impact either the human (students, teachers, and staff) or the physical or virtual (e.g., information technology [IT] networks and systems) elements of schools and school districts. While there may be some overlap in addressing human versus physical/virtual threats, preparing for each type can require input from different…
Descriptors: Safety, School Safety, Information Technology, Internet
Wojniak, Justyna; Majorek, Marta – Universal Journal of Educational Research, 2016
The paper concerns the opportunities of use information and communication technologies for the education purposes. It presents key assumptions of the European Union policy concerning innovative methods of training and the prospects for their further development. As nowadays one can observe increasing activity of the children and young people in…
Descriptors: Internet, Information Security, Child Safety, Risk
Zydney, Janet Mannheimer; Hooper, Simon – TechTrends: Linking Research and Practice to Improve Learning, 2015
Educators can use video to gain invaluable information about their students. A concern is that collecting videos online can create an increased security risk for children. The purpose of this article is to provide ethical and legal guidelines for designing video-based apps for mobile devices and the web. By reviewing the literature, law, and code…
Descriptors: Video Technology, Computer Software, Computer System Design, Design Requirements
Curriculum Review, 2009
An increasingly popular form of communication among teenagers is "sexting," sending nude photos via text messaging, reported The Orange County Register (3/20/09). This "flirtation" technique has sparked quite a bit of debate: is this simply a form of rebellion or is it dangerous behavior that could have adverse penalties? Although many teens say…
Descriptors: Child Safety, Computer Software, Adolescents, Computer Mediated Communication
Villano, Matt – T.H.E. Journal, 2008
The Children's Internet Protection Act (CIPA) requires any school or library receiving funding from the federal E-Rate program to deploy web filtering technology to prevent users from viewing objectionable material while they are using the institution's computers. However, opponents of web filtering legislation question whether or not mandated…
Descriptors: Internet, Web Sites, Computer Security, Computer Uses in Education