NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Trends in International…1
What Works Clearinghouse Rating
Showing 241 to 255 of 618 results Save | Export
Bosley, Sara – Adults Learning, 2011
Everyone knows that lack of internet access can reinforce the social and economic disadvantages already facing some older people. Recognising the divisive nature of digital exclusion, the government has invested 2.8 million British Pounds in Get Digital, a project that will enable sheltered housing residents to develop computer and internet…
Descriptors: Focus Groups, Computers, Housing, Educational Technology
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime
Foundation for Excellence in Education (ExcelinEd), 2014
A full year of progress in advancing education reform across America is documented in each of the Foundation for Excellence in Education's Annual Reports. The illustrated pages of the 2014 report, provide data-rich updates on Excellence in Education's work to advance student-centered policies in more than 40 states, all aimed at improving learning…
Descriptors: Educational Change, Educational Quality, Excellence in Education, Student Centered Learning
Blazer, Christie – Research Services, Miami-Dade County Public Schools, 2009
More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…
Descriptors: Web Sites, Social Networks, Information Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Suess, Jack; Morooney, Kevin – EDUCAUSE Review, 2009
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
Descriptors: Higher Education, Internet, Computer Software, Computer Security
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Rursch, Julie A.; Luse, Andy; Jacobson, Doug – IEEE Transactions on Education, 2010
The IT-Adventures program is dedicated to increasing interest in and awareness of information technology among high school students using inquiry-based learning focused on three content areas: cyber defense, game design programming, and robotics. The program combines secondary, post-secondary, and industry partnerships in educational programming,…
Descriptors: Inquiry, Service Learning, Active Learning, High School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Young, Jeffrey R. – Chronicle of Higher Education, 2008
User awareness is growing in importance when it comes to computer security. Not long ago, keeping college networks safe from cyberattackers mainly involved making sure computers around campus had the latest software patches. New computer worms or viruses would pop up, taking advantage of some digital hole in the Windows operating system or in…
Descriptors: Computer Software, Computer Security, Educational Technology, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Sturgeon, Julie – T.H.E. Journal, 2008
Acting on information from students who reported seeing a classmate looking at inappropriate material on a school computer, school officials used forensics software to plunge the depths of the PC's hard drive, searching for evidence of improper activity. Images were found in a deleted Internet Explorer cache as well as deleted file space.…
Descriptors: Computer Software, Computers, Internet, School Safety
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Baule, Steven M.; Kriha, Darcy L. – Library Media Connection, 2008
In the potential shadow of a "Bong Hits for Jesus" banner, complicated student speech and discipline issues arise almost daily on the Internet. Whether it is a mock MySpace page set up to make fun of a teacher or a direct threat to an assistant principal, it is often unclear exactly where school ground discipline ends and student free speech…
Descriptors: Campuses, Discipline, Freedom of Speech, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Shelton, Kay – Community & Junior College Libraries, 2009
The media often report on the negativity of Facebook, with horror stories of people losing their jobs because of something they posted. There can be useful purposes for Facebook, however, especially after the unthinkable happens on a college campus. Community college libraries can incorporate Facebook into their security planning.
Descriptors: Community Colleges, College Libraries, Social Networks, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Du, Wenliang; Wang, Ronghua – Journal on Educational Resources in Computing, 2008
The security and assurance of our computing infrastructure has become a national priority. To address this priority, higher education has gradually incorporated the principles of computer and information security into the mainstream undergraduate and graduate computer science curricula. To achieve effective education, learning security principles…
Descriptors: Computer Security, Laboratories, Computers, Computer Science
Peer reviewed Peer reviewed
Direct linkDirect link
Villano, Matt – T.H.E. Journal, 2008
The Children's Internet Protection Act (CIPA) requires any school or library receiving funding from the federal E-Rate program to deploy web filtering technology to prevent users from viewing objectionable material while they are using the institution's computers. However, opponents of web filtering legislation question whether or not mandated…
Descriptors: Internet, Web Sites, Computer Security, Computer Uses in Education
Pages: 1  |  ...  |  13  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  21  |  ...  |  42