Publication Date
| In 2026 | 0 |
| Since 2025 | 2 |
| Since 2022 (last 5 years) | 21 |
| Since 2017 (last 10 years) | 39 |
| Since 2007 (last 20 years) | 96 |
Descriptor
| Computer Mediated… | 127 |
| Computer Security | 127 |
| Internet | 75 |
| Foreign Countries | 40 |
| Information Technology | 34 |
| Privacy | 33 |
| Computer Uses in Education | 28 |
| Educational Technology | 27 |
| Bullying | 26 |
| Information Security | 25 |
| Social Networks | 25 |
| More ▼ | |
Source
Author
| Berson, Ilene R. | 2 |
| Berson, Michael J. | 2 |
| Descy, Don E. | 2 |
| Martin, Florence | 2 |
| Abd Rahman, Nur Hidayah | 1 |
| Abdel-Karim Al-Tamimi | 1 |
| Adorjan, Michael | 1 |
| Ahmad, Atif | 1 |
| Alison Lui | 1 |
| Alper Yayla | 1 |
| Amin, Rohan Mahesh | 1 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 6 |
| Practitioners | 4 |
| Administrators | 3 |
| Students | 3 |
| Media Staff | 2 |
| Parents | 2 |
| Policymakers | 1 |
| Researchers | 1 |
Location
| Turkey | 8 |
| Canada | 4 |
| Spain | 4 |
| United Kingdom | 4 |
| Brazil | 3 |
| California | 3 |
| Germany | 3 |
| Greece | 3 |
| Italy | 3 |
| Mexico | 3 |
| Ohio | 3 |
| More ▼ | |
Laws, Policies, & Programs
| Digital Millennium Copyright… | 1 |
| Family Educational Rights and… | 1 |
Assessments and Surveys
| Program for International… | 2 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Peer reviewedMiladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Riley, Sheila – Technology & Learning, 2007
It is not always easy to find the balance between protecting students from Internet dangers and distractions and reaping its benefits--but it is certainly on every district's tech priority list. Sharnell Jackson, chief e-learning officer for the 415,000-student Chicago Public Schools, and Miguel Guhlin, director of instructional technology…
Descriptors: Computer Security, School Safety, Computer Mediated Communication, Parent Education
Peer reviewedPhillips, Bruce – Canadian Journal of Information and Library Science, 1995
This lecture by the Privacy Commissioner of Canada addresses issues related to information technology and privacy, including privacy law, government role, surveillance techniques, and security measures to protect the privacy of electronic communications. The text of the question and answer period following the lecture is included. (MES)
Descriptors: Computer Mediated Communication, Computer Security, Federal Legislation, Foreign Countries
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
What would people do without the Internet? It gives them the world at their fingertips. Almost anything that they want and need can be found in one neat little place. The Internet is a great place for kids also. They can be entertained, chat with friends, and learn about whatever interests them. Unfortunately the Internet also helps people…
Descriptors: Internet, Computer Security, Child Safety, Computer Mediated Communication
Tynes, Brendesha M. – Journal of Adolescent Research, 2007
Many Internet safety and parenting experts suggest that parents prohibit their teens from social networking sites and other online spaces where predators may lurk. But we may do adolescents a disservice when we curtail their participation in these spaces, because the educational and psychosocial benefits of this type of communication can far…
Descriptors: Safety, Internet, Adolescents, Social Networks
Olagunju, Amos O. – Online Submission, 2008
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…
Descriptors: Safety, Parent Participation, Parent Role, Parent School Relationship
Smith, Shana Shiang-Fong – Journal of Technology Studies, 2004
Due to the now widespread use of the Internet, most companies now require computer aided design (CAD) tools that support distributed collaborative design on the Internet. Such CAD tools should enable designers to share product models, as well as related data, from geographically distant locations. However, integrated collaborative design…
Descriptors: Intellectual Property, Internet, Distance Education, Computer Assisted Design
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Cole, David R. – E-Learning, 2007
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process…
Descriptors: Electronic Learning, Terrorism, Internet, Educational Technology
Peer reviewedFurnell, S. M.; Onions, P. D.; Bleimann, U.; Gojny, U.; Knahl, M.; Roder, H. F.; Sanders, P. W. – Internet Research, 1998
Presents a generic reference model for online distance learning and discusses security issues for each stage (enrollment, study, completion, termination, suspension). Discusses a security framework (authentication and accountability, access control, intrusion detection, network communications, nonrepudiation, learning resources provider…
Descriptors: Accountability, Alarm Systems, Computer Mediated Communication, Computer Security
Starkman, Neal – T.H.E. Journal, 2007
Through conversations with students across different grade levels, there is clear evidence that two of the things they most desire contradict each other--and they use electronic technology to get both of them. This author had conversations with three groups of students in Seattle about their favorite electronic technologies, and any concerns they…
Descriptors: Privacy, High School Students, Computer Mediated Communication, Information Technology
Peer reviewedSun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Leino, Kaisa – Scandinavian Journal of Educational Research, 2006
This study explores the perceptions of Finnish 15-year-olds on the advantages and disadvantages of the Internet. The data, students' written responses (N = 3112), were gathered in the context of the OECD Programme for International Student Assessment (PISA) in the spring of 2000 as a national option. The data were analysed by close reading and…
Descriptors: Foreign Countries, Adolescents, Internet, Student Attitudes
Lafee, Scott – School Administrator, 2005
In an era of digital technologies, school districts find themselves on a cutting edge, one that slices both ways. Technological tools like the Internet, e-mail, networked computers and such have revolutionized the way children are taught and schools are run, but they also have created new management challenges and ethical issues that many school…
Descriptors: Educational Technology, Computer Uses in Education, Computer Security, Ethics
Peer reviewedHorn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Direct link
