Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 14 |
Descriptor
Access to Information | 22 |
Computer Software | 22 |
Privacy | 22 |
Computer Security | 9 |
Internet | 8 |
Educational Technology | 7 |
Foreign Countries | 7 |
Users (Information) | 6 |
Computers | 5 |
Electronic Publishing | 5 |
Information Security | 5 |
More ▼ |
Source
Author
Publication Type
Education Level
Higher Education | 6 |
Postsecondary Education | 5 |
Elementary Secondary Education | 3 |
Elementary Education | 1 |
Grade 3 | 1 |
Secondary Education | 1 |
Audience
Teachers | 2 |
Administrators | 1 |
Media Staff | 1 |
Location
United States | 3 |
Asia | 2 |
Australia | 2 |
Brazil | 2 |
Germany | 2 |
Japan | 2 |
South Korea | 2 |
Turkey | 2 |
United Kingdom | 2 |
Alabama | 1 |
California | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Nasereddin, Mahdi; Glantz, Edward J.; Grimes, Galen A.; Peca,Joanne; Gordon, Michelle; Bartolacci, Mike – Journal of Cybersecurity Education, Research and Practice, 2022
Digital contact tracing tools were developed to decrease the spread of COVID-19 by supplementing traditional manual methods. Although these tools have great potential, they were developed rather quickly resulting in tools with varying levels of success. The main issues with these tools are over privacy and who might have access to the information…
Descriptors: Privacy, Information Technology, COVID-19, Pandemics
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning
Sauers, Nicholas J.; Richardson, Jayson W. – Journal of Research on Technology in Education, 2019
School leaders around the world navigate a learning environment where most students have (or soon will have) ubiquitous access to an Internet-connected device. As a result, districts have implemented acceptable use policies (AUPs) to address the ways that students are using those technologies. In this study, we analyzed the AUPs of 75 one-to-one…
Descriptors: Computer Use, Policy Formation, Student Empowerment, Board of Education Policy
O'Brien, Jason; Roller, Sarah; Lampley, Sandra – Journal of Cases in Educational Leadership, 2017
This case focuses on the potential problems associated with sharing personally identifiable information (PII) when students are required to use third-party software. Specifically, third-grade students were required to complete "LearningPad" activities as a component of their homework grade in math, spelling, and language arts. As…
Descriptors: Shared Resources and Services, Privacy, Computer Software, Grade 3
McShane, Ian; Dearman, Philip – Australian Association for Research in Education, 2016
This paper examines the rise and fall of the Victorian education department's learning management system Ultranet. The Ultranet was conceived as a web-based portal that was designed to integrate and deliver on a range of policy objectives in the areas of student management, school networking and communication, and teaching and learning. Heavily…
Descriptors: Foreign Countries, Educational Technology, Computer Software, Technology Integration
Pagano, Matthew Wallach – ProQuest LLC, 2013
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Descriptors: Patients, Health Services, Information Technology, Information Security
Stephen, Sheryl-Ann K. – Journal of Learning in Higher Education, 2014
It has been documented that Facebook is the most popular social networking site among students. Given that most students are already users of Facebook, implementing it into the curriculum provides an easy way for students to actively participate in class activities. This paper explores the idea that the use of Facebook Groups to complement…
Descriptors: Teaching Methods, Finance Occupations, Computer Software, Business Administration Education
Pereira, Roberto; Baranauskas, M. Cecilia C.; da Silva, Sergio Roberto P. – Educational Technology & Society, 2013
Social software is a growing reality worldwide and several authors are discussing its use to promote social interaction in learning contexts. Although problems regarding privacy, reputation, and identity are commonly reported in social software, an explicit concern regarding peoples' values is not a common practice in its design and adoption,…
Descriptors: Social Networks, Computer Software, Semiotics, Values
Briggs, Linda L. – Campus Technology, 2008
As any instructor knows, the easy availability of internet content has greatly increased student opportunities for work that is less than original. Today, the term plagiarism can range in meaning from using an unattributed phrase or sentence (accidentally or intentionally) to submitting entire purchased works as one's own. The profusion of online…
Descriptors: Plagiarism, Internet, College Students, Writing Assignments
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Smallwood, Carol, Ed. – ALA Editions, 2011
There's no shortage of library management books out there--but how many of them actually tackle the little details of day-to-day management, the hard-to-categorize things that slip through the cracks of a larger handbook? "Library Management Tips that Work" does exactly that, addressing dozens of such issues facing library managers, including: (1)…
Descriptors: Library Administration, Time Management, Guides, Personnel Management
Brandt, D. Scott – Computers in Libraries, 1998
Examines Internet security risks and how users can protect themselves. Discusses inadvertent bugs in software; programming problems with Common Gateway Interface (CGI); viruses; tracking of Web users; and preventing access to selected Web pages and filtering software. A glossary of Internet security-related terms is included. (AEF)
Descriptors: Access to Information, Computer Security, Computer Software, Glossaries
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
Britz, J. J. – Microcomputers for Information Management, 1996
Assesses the impact of technology on privacy. Discusses electronic monitoring of people in the workplace; interception and reading of e-mail messages; merging of databases which contain personal information; rise in the number of hackers; and the development of software that makes the decoding of digital information virtually impossible. Presents…
Descriptors: Access to Information, Computer Software, Confidentiality, Databases

Holtze, Terri L.; Rader, Hannelore B. – RSR: Reference Services Review, 2000
Focuses on intellectual freedom, discussing the role of libraries, the Berlin Wall and banned books as attempts to restrict intellectual freedom, and controversies surrounding filtering software. Contains an annotated bibliography of intellectual freedom resources, presented in five categories: general; government and legal issues; access and…
Descriptors: Access to Information, Annotated Bibliographies, Censorship, Computer Software
Previous Page | Next Page ยป
Pages: 1 | 2