NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 44 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Eyuboglu, Fatma Aycan Binay; Yilmaz, Fatma Gizem Karaoglan – Education Quarterly Reviews, 2022
Individuals may encounter many negativities due to the misuse of computers and the Internet. Children suffer the most from these negativities. This situation necessitates parents who always protect and stand by their children, to become knowledgeable about the safe use of computers and the Internet. In this study, we examined the opinions of the…
Descriptors: Parent Attitudes, Internet, Computer Uses in Education, Child Safety
Hoefling, Trina – Stylus Publishing LLC, 2017
Remote working is the new reality, and transactional work--provided by freelancers, contract employees or consultants--has increased exponentially. It is forecast that as much as half the labor force will be working independently and virtually by 2020. Most organizations are still grappling with how to effectively manage their virtual staff and…
Descriptors: Technological Literacy, Teamwork, Computer Mediated Communication, Communications
Peer reviewed Peer reviewed
Direct linkDirect link
Deveci Topal, Arzu; Kolburan Gecer, Aynur – Educational Research and Reviews, 2015
The development of web 2.0 technology has resulted in an increase in internet sharing. The scope of this study is social networking, which is one of the web 2.0 tools most heavily used by internet users. In this paper, the unethical behaviours that preservice teachers encounter on social networks and the ways to deal with these problems are…
Descriptors: Preservice Teachers, Ethics, Social Networks, Web 2.0 Technologies
US Department of Homeland Security, 2013
The "Stop.Think.Connect. Community Outreach Toolkit" was adapted from the Federal Trade Commission's "OnGuardOnline.gov," a project that provides practical tips to help guard against Internet fraud and protect your privacy. The kit will help you offer your community information about protecting kids online. It includes "Stop.Think.Connect.," a…
Descriptors: Internet, Computer Security, Computer Mediated Communication, Guides
Peer reviewed Peer reviewed
Direct linkDirect link
Miron, Eli; Ravid, Gilad – Educational Technology & Society, 2015
The move from a walled garden type Learning Management Systems (LMS) to open environments (like Facebook) forces us to adapt new teaching ways. This article offers a brief review of the use of Facebook groups in learning, describes the experience of using Facebook groups in an academic institute, explains the considerations for choosing the type…
Descriptors: Integrated Learning Systems, Social Media, Computer Mediated Communication, Privacy
Guerry, Richard – Education Digest: Essential Readings Condensed for Quick Review, 2012
Most discussions about keeping kids safe online center around two issues: (1) With the rapid development and dissemination of digital technology, how can we stay ahead of what our students are doing?; and (2) What controls are available to prevent students from visiting inappropriate sites? These are reasonable questions, but they ignore two…
Descriptors: Internet, Accountability, Bullying, Computers
McNeal, McKenzie, III. – ProQuest LLC, 2012
Current networking architectures and communication protocols used for Wireless Sensor Networks (WSNs) have been designed to be energy efficient, low latency, and long network lifetime. One major issue that must be addressed is the security in data communication. Due to the limited capabilities of low cost and small sized sensor nodes, designing…
Descriptors: Computer Mediated Communication, Information Security, Computer Security, Communications
Wespieser, Karen – National Foundation for Educational Research, 2015
This report looks at the online activities of London's young people. The report highlights that children and young people use technology to have fun, study and communicate with others. Most children and young people have positive experiences online. On the whole they are sensible online and do not put themselves "at risk". However, the…
Descriptors: Foreign Countries, Internet, Children, Youth
Peer reviewed Peer reviewed
Direct linkDirect link
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Kligiene, Stanislava Nerute – Informatics in Education, 2012
The paper surveys the risks and benefits which the user faces in the networked environment and how those challenges can be overcome. The question is how to measure the potential or benefits of such a complex phenomenon--the collaborative cross-domains in social media. As one of the solutions we propose to consider this in the context of digital…
Descriptors: Social Networks, Data Collection, Privacy, Computer Mediated Communication
Webb, James O., Jr. – ProQuest LLC, 2012
There is a perception that there are risks and benefits associated with the use of online social networking media within a military organization. This research study explored this perception by investigating how employees use social networking applications and their perceptions of the benefits they receive. The study also assessed the measures…
Descriptors: Grounded Theory, Risk, Social Networks, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Mott, Jonathan – EDUCAUSE Quarterly, 2010
Learning management systems (LMSs) have dominated the teaching and learning landscape in higher education for the past decade, with a recent Delta Initiative report indicating that more than 90 percent of colleges and universities have a standardized, institutional LMS implementation. While the LMS has become central to the business of colleges…
Descriptors: Higher Education, Web Sites, Open Education, Management Systems
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Maloney, Stephen; Moss, Alan; Ilic, Dragan – Advances in Health Sciences Education, 2014
Social Networking Sites (SNS) have seen exponential growth in recent years. The high utilisation of SNS by tertiary students makes them an attractive tool for educational institutions. This study aims to identify health professional students' use and behaviours with SNS, including students' perspectives on potential applications within…
Descriptors: Social Networks, Electronic Learning, Technology Uses in Education, Health Education
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Previous Page | Next Page »
Pages: 1  |  2  |  3