NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Media Staff1
Assessments and Surveys
Rosenberg Self Esteem Scale1
What Works Clearinghouse Rating
Showing 1 to 15 of 26 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Chisita, Collence Takaingenhamo; Chiparausha, Blessing – New Review of Academic Librarianship, 2021
The article explores the recent experiences encountered by the Bindura University of Science Education (BUSE) Library, Zimbabwe in the daily operations of its institutional repository (IR) with emphasis on security and ethical issues. It examines the present scenario in the management of the IR. BUSE Library set up an IR to archive and enable…
Descriptors: Electronic Libraries, Electronic Publishing, Archives, Academic Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Ramu, Gandikota – Education and Information Technologies, 2018
In recent years, the Internet of Things (IoT), cloud computing, and wireless body area networks (WBANs) have converged and become popular due to their potential to improve quality of life. This convergence has greatly promoted the industrialization of e-healthcare. With the flourishing of the e-healthcare industry, full electronic health records…
Descriptors: Internet, Records (Forms), Health Services, Information Management
Singer, Peter Warren; Fisk, Nathan; Anderson, Jimmeka; Guernsey, Lisa – New America, 2021
Our children, and our nation, face new challenges in our increasingly digital world. The following report makes the case for building greater resilience against the growing problems of misinformation and disinformation by equipping our teachers and students with the tools and skills they need to face and understand those problems. It begins with…
Descriptors: National Security, Computer Security, Information Security, Citizenship Education
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Louisiana Department of Education, 2018
Data is a crucial component in educational success. It gives educators the power to address student needs, study what strategies work, and make necessary changes so that every student has the greatest opportunity. Today, educators, parents, and students have access to more data than ever before and have access to more technology tools to…
Descriptors: Information Management, Privacy, Student Records, Standards
Le, Meixing – ProQuest LLC, 2013
In this dissertation, we discuss the problem of enabling cooperative query execution in a multi-cloud environment where the data is owned and managed by multiple enterprises. Each enterprise maintains its own relational database using a private cloud. In order to implement desired business services, parties need to share selected portion of their…
Descriptors: Data, Access to Information, Computer Networks, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Changchit, Chuleeporn – International Journal of Information and Communication Technology Education, 2015
Cloud computing has become increasingly popular among users and businesses around the world, and education is no exception. Cloud computing can bring an increased number of benefits to an educational setting, not only for its cost effectiveness, but also for the thirst for technology that college students have today, which allows learning and…
Descriptors: Internet, Information Storage, Computer Software, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Gafni, Ruti; Nagar, Idan – Interdisciplinary Journal of e-Skills and Lifelong Learning, 2016
CAPTCHA is one of the most common solutions to check if the user trying to enter a Website is a real person or an automated piece of software. This challenge-response test, implemented in many Internet Websites, emphasizes the gaps between accessibility and security on the Internet, as it poses an obstacle for the learning-impaired in the reading…
Descriptors: Program Effectiveness, Learning Disabilities, Questionnaires, Problem Solving
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Felzmann, Heike – Research-publishing.net, 2013
This chapter discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in the Irish context in relation to its application to internet research. The chapter begins with a brief outline of high profile cases in the early history of the internet that highlighted specific emerging…
Descriptors: Foreign Countries, Ethics, Internet, Privacy
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Moradi Sheykhjan, Tohid – Online Submission, 2017
Our goal for this paper discusses the main research ethical concerns that arise in internet research and reviews existing research ethical guidance in relation to its application for educating digital citizens. In recent years we have witnessed a revolution in Information and Communication Technologies (ICTs) that has transformed every field of…
Descriptors: Internet, Online Searching, Educational Research, Social Science Research
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Molnar, Alex; Boninger, Faith – National Education Policy Center, 2015
Computer technology has made it possible to aggregate, collate, analyze, and store massive amounts of information about students. School districts and private companies that sell their services to the education market now regularly collect such information, raising significant issues about the privacy rights of students. Most school districts lack…
Descriptors: Privacy, Information Security, Data, Student Records
Graafland, Julie Hooft – OECD Publishing, 2018
This paper provides a synthesis of the literature on and recent trends in new technologies and its effect on 21st century children (0-18 years old). It begins by providing an overview of recent trends in the access and use of new technologies as well as a summary of online opportunities and risks. It then explores a variety of factors, including…
Descriptors: Technology Uses in Education, Technological Advancement, Web 2.0 Technologies, Elementary Secondary Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Achinewhu-Nworgu, Elizabeth; Azaiki, Steve; Nworgu, Queen Chioma – Bulgarian Comparative Education Society, 2016
This paper aims to present the role, values, and legal policy issues facing public Library resources in supporting students to achieve academic success. Research indicates that majority of people that own or work in the Library tend to ignore some of the vital roles, values and legal policy issues paramount to libraries. Some of these issues are…
Descriptors: Public Libraries, Library Materials, Academic Achievement, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Andrew Hope – Discourse: Studies in the Cultural Politics of Education, 2015
The introduction of widespread school Internet access in industrialised countries has been accompanied by the materialisation of what can be labelled as a national school e-safety agenda. Drawing upon Foucault's notions of discourse and governmentality, this paper explores how e-safety policy documents serve to constrain the conceptual…
Descriptors: Policy Analysis, Information Policy, Information Security, Social Control
Previous Page | Next Page »
Pages: 1  |  2