Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 8 |
Descriptor
Source
Author
Bailey, Gerald D. | 1 |
Barrett, Joanne | 1 |
Johnson, Doug | 1 |
K. Thiyagu | 1 |
Kruger, Robert | 1 |
Lemoine, Pamela A. | 1 |
McCollum, Kelly | 1 |
O'Hanlon, Charlene | 1 |
Ribble, Mike S. | 1 |
Richardson, Michael D. | 1 |
Stephens, Walter E. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 11 |
Journal Articles | 8 |
Guides - Classroom - Teacher | 2 |
Books | 1 |
Guides - General | 1 |
Education Level
Elementary Secondary Education | 6 |
Elementary Education | 1 |
Higher Education | 1 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
T. Santhosh; K. Thiyagu – Malaysian Online Journal of Educational Technology, 2024
The role of ethics becomes even more significant given the huge advent and increase of cyber-criminal activities in cyberspace. It has become an urgent necessity to curb the menace of unethical practices in cyberspace and contribute ethical guidelines to a safe and secure digital environment. To minimize the growth of cybercrimes and unethical…
Descriptors: Ethics, Crime, Internet, Guidelines
Richardson, Michael D.; Lemoine, Pamela A.; Stephens, Walter E.; Waller, Robert E. – Educational Planning, 2020
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st century. Computer security is an essential instrument for protecting children, but K-12 schools are considered one of the most attractive targets for data privacy crimes often due to the less-than-effective cybersecurity practices in schools. The human…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Privacy
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2020
The onset of COVID-19 has dramatically increased the usage of digital learning formats by education agencies across the nation and shifted the learning environment to "school at home." Since students are online more, they are vulnerable to more threats. Cyber safety is critical and is a shared responsibility of students, parents, and…
Descriptors: COVID-19, Pandemics, Educational Technology, Technology Uses in Education
White, Lawrence – Association of Governing Boards of Universities and Colleges, 2015
A principle responsibility of a board member is to understand the environment in which his or her institution operates. Today, that environment includes a host of legal risks that every institution of higher education must be prepared to assess and proactively address. Colleges and universities work to contain and manage those risks through such…
Descriptors: Legal Problems, Sexual Abuse, Student Behavior, Risk
O'Hanlon, Charlene – T.H.E. Journal, 2009
Since laptop programs extend instruction beyond the campus, it is then a must for schools to try a variety of solutions to protect their machines--and their users. Combining high-tech safeguards with face-to-face user education is a must for schools whose laptop programs allow students to take the computers off-site. For a cautionary tale on the…
Descriptors: Educational Technology, Laptop Computers, Access to Computers, Computer Security
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Villano, Matt – T.H.E. Journal, 2008
With K-12 students seeming to, at all times, have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The movement to address and characterize digital citizenship originated in the UK,…
Descriptors: Citizenship, Elementary Secondary Education, Educational Technology, Internet

Ribble, Mike S.; Bailey, Gerald D. – T.H.E. Journal, 2004
Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is beginning to emerge in society. This outbreak of technology misuse and abuse is documented in continual news coverage on TV, in newspapers and on the Internet--both inside and outside of schools. The endless list of misuse and…
Descriptors: Computer Security, Crime, Technology Education, Citizenship
Barrett, Joanne – Learning & Leading with Technology, 2006
Social networking is one of the latest trends to evolve out of the growing online community. Social networking sites gather data submitted by members that is then stored as user profiles. The data or profiles can then be shared among the members of the site. Membership can be free or fee-based. A typical social networking site provides members…
Descriptors: Elementary Secondary Education, Profiles, Social Networks, Web Sites
Kruger, Robert – Social Studies, 2003
As computers become a larger part of the curriculum, educators everywhere are being asked to take a stand for cyber ethics, the right and wrong of computer and Internet use. Teachers cannot always depend on parents to instill cyber ethics. Parents may not know or follow the rules, either. Once students understand cyber ethics, they may have a…
Descriptors: Ethics, Middle School Students, Computer Security, Elementary School Students
McCollum, Kelly – Chronicle of Higher Education, 1999
Colleges and universities are finding that ways to misbehave in computer-mediated communication come along faster than institutions can create policies to deal with them. Although most schools have acceptable-use policies, technological advances change the environment quickly and require flexible policies. Most institutions have created a mix of…
Descriptors: Administrative Policy, Computer Mediated Communication, Computer Networks, Computer Security