Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 10 |
Descriptor
Computer Security | 10 |
Safety | 10 |
Internet | 6 |
Computer Uses in Education | 3 |
Educational Technology | 3 |
Ethics | 3 |
Surveys | 3 |
Access to Information | 2 |
Bullying | 2 |
Computer Mediated… | 2 |
Computer Software | 2 |
More ▼ |
Source
Author
Woollard, John | 2 |
Anderson, Jimmeka | 1 |
Brustoloni, Jose Carlos | 1 |
Buchanan, Rachel | 1 |
Fisk, Nathan | 1 |
Greenhalgh-Spencer, Heather | 1 |
Guernsey, Lisa | 1 |
Olagunju, Amos O. | 1 |
Powell, Ken | 1 |
Pusey, Portia | 1 |
Russell, Terry | 1 |
More ▼ |
Publication Type
Reports - Evaluative | 10 |
Journal Articles | 6 |
Books | 1 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Postsecondary Education | 4 |
Elementary Secondary Education | 3 |
Adult Education | 2 |
Elementary Education | 2 |
Higher Education | 2 |
Grade 12 | 1 |
Grade 2 | 1 |
Grade 3 | 1 |
Grade 4 | 1 |
Grade 5 | 1 |
Grade 6 | 1 |
More ▼ |
Location
Australia | 1 |
Florida | 1 |
United Kingdom | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Greenhalgh-Spencer, Heather – Educational Theory, 2019
In this article, Heather Greenhalgh-Spencer analyzes three examples of curricula aimed at cultivating good cyber behavior and countering online harassment. These curricula are branded as addressing civic needs, cultivating civic duty, and developing skills to help students understand and react to online threats. Here, Greenhalgh-Spencer offers two…
Descriptors: Computer Security, Safety, Bullying, Computer Mediated Communication
Buchanan, Rachel; Southgate, Erica; Smith, Shamus P. – Global Studies of Childhood, 2019
Teachers are under increased pressure to teach children digital skills, and parents are having to manage children's online presence as well as their offline lives. Much of the discussion surrounding the issue of children's digital footprints highlights the potential present and future risks that children could be exposed to. While parents and…
Descriptors: Parent Attitudes, Teacher Attitudes, Technological Literacy, Foreign Countries
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Executive Office of the President, 2016
Advances in Artificial Intelligence (AI) technology have opened up new markets and new opportunities for progress in critical areas such as health, education, energy, and the environment. In recent years, machines have surpassed humans in the performance of certain specific tasks, such as some aspects of image recognition. Experts forecast that…
Descriptors: Artificial Intelligence, Federal Government, Federal Regulation, Research and Development
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics
Pusey, Portia; Sadera, William A. – Journal of Digital Learning in Teacher Education, 2012
In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related and Internet-capable technologies into instructional settings to improve student learning. Many presume that preservice teachers have the knowledge to competently model and teach issues of safety when working with these devices as…
Descriptors: Preservice Teacher Education, Preservice Teachers, Standards, Laws
Woollard, John – Routledge, Taylor & Francis Group, 2011
"Psychology for the Classroom: E-Learning" is a lively and accessible introduction to the field of technology-supported teaching and learning and the educational psychology associated with those developments. Offering a substantial and useful analysis of e-learning, this practical book includes current research, offers a grounding in both theory…
Descriptors: Electronic Learning, Blended Learning, Social Justice, Constructivism (Learning)
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
Olagunju, Amos O. – Online Submission, 2008
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…
Descriptors: Safety, Parent Participation, Parent Role, Parent School Relationship
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments