NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 151 to 165 of 279 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Renaud, Karen; Cutts, Quintin – ACM Transactions on Computing Education, 2013
Computing science students amass years of programming experience and a wealth of factual knowledge in their undergraduate courses. Based on our combined years of experience, however, one of our students' abiding shortcomings is that they think there is only "one correct answer" to issues in most courses: an "idealistic"…
Descriptors: Computer Security, Teaching Methods, Computer Science, Decision Making
Peer reviewed Peer reviewed
PDF on ERIC Download full text
National Forum on Education Statistics, 2011
This document, "Book Three of Four: Effectively Managing LDS Data," is the third installment of this Forum series of guides on longitudinal data systems (LDS). This third book in the guide series discusses organizational issues aimed at moving the project forward and ensuring that the data are of high quality so that users may leverage…
Descriptors: Information Systems, Information Management, Data, Organization
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2011
The need to maintain an unpolluted learning environment is no easy task for schools and districts that have incorporated social networking sites into their educational life. The staff and teachers at Blaine High School in Minnesota's Anoka-Hennepin District 11 had been considering the pros and cons of establishing a school Facebook page when the…
Descriptors: Social Networks, Web Sites, Educational Environment, High Schools
Schneider, Tod – National Clearinghouse for Educational Facilities, 2010
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Descriptors: School Security, Information Technology, Safety, School Personnel
Peer reviewed Peer reviewed
Direct linkDirect link
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Maloney, Stephen; Moss, Alan; Ilic, Dragan – Advances in Health Sciences Education, 2014
Social Networking Sites (SNS) have seen exponential growth in recent years. The high utilisation of SNS by tertiary students makes them an attractive tool for educational institutions. This study aims to identify health professional students' use and behaviours with SNS, including students' perspectives on potential applications within…
Descriptors: Social Networks, Electronic Learning, Technology Uses in Education, Health Education
Peer reviewed Peer reviewed
Direct linkDirect link
Bachman, Dale J.; Brown, Ezra A.; Norton, Anderson H. – Mathematics Teacher, 2010
Cryptography is the science of hidden or secret writing. More generally, cryptography refers to the science of safeguarding information. Cryptography allows people to use a public medium such as the Internet to transmit private information securely, thus enabling a whole range of conveniences, from online shopping to personally printed movie…
Descriptors: Intellectual Property, Privacy, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Lorenz, Anja; Borcea-Pfitzmann, Katrin – Interactive Technology and Smart Education, 2010
Purpose: Facing the dilemma between collaboration and privacy is a continual challenge for users. In this setting, the purpose of this paper is to discuss issues of a highly flexible role management integrated in a privacy-enhanced collaborative environment (PECE). Design/methodology/approach: The general framework was provided by former findings…
Descriptors: Cooperation, Interaction, Data, Role
DeSantis, Nick – Chronicle of Higher Education, 2012
College campuses are hothouses of data, including course schedules, degree requirements, and grades. But much of the information remains spread out across software systems or locked on university servers. Start-up companies want to pry the information loose from campus servers in order to offer personalized services that could transform the…
Descriptors: Higher Education, Campuses, Grades (Scholastic), Scores
Peer reviewed Peer reviewed
Direct linkDirect link
Pereira, Roberto; Baranauskas, M. Cecilia C.; da Silva, Sergio Roberto P. – Educational Technology & Society, 2013
Social software is a growing reality worldwide and several authors are discussing its use to promote social interaction in learning contexts. Although problems regarding privacy, reputation, and identity are commonly reported in social software, an explicit concern regarding peoples' values is not a common practice in its design and adoption,…
Descriptors: Social Networks, Computer Software, Semiotics, Values
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Willard, Nancy – Corwin, 2012
Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…
Descriptors: Child Safety, Computers, Internet, Secondary School Students
Pages: 1  |  ...  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  14  |  15  |  ...  |  19