Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Mediated… | 4 |
Computer Security | 4 |
Internet | 4 |
Computer Software | 2 |
Privacy | 2 |
Safety | 2 |
Attitude Measures | 1 |
Behavior Standards | 1 |
Citizenship | 1 |
Computer Peripherals | 1 |
Computer Uses in Education | 1 |
More ▼ |
Source
T.H.E. Journal | 4 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Education Level
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Middle Schools | 1 |
Audience
Location
Kansas | 1 |
Washington | 1 |
Wyoming | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Villano, Matt – T.H.E. Journal, 2008
With K-12 students seeming to, at all times, have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The movement to address and characterize digital citizenship originated in the UK,…
Descriptors: Citizenship, Elementary Secondary Education, Educational Technology, Internet

Rajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet
Starkman, Neal – T.H.E. Journal, 2007
Through conversations with students across different grade levels, there is clear evidence that two of the things they most desire contradict each other--and they use electronic technology to get both of them. This author had conversations with three groups of students in Seattle about their favorite electronic technologies, and any concerns they…
Descriptors: Privacy, High School Students, Computer Mediated Communication, Information Technology