Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 19 |
Descriptor
Access to Information | 24 |
Computer Security | 24 |
Computer Software | 24 |
Internet | 16 |
Information Technology | 9 |
Privacy | 9 |
Computer Mediated… | 7 |
Computer Networks | 7 |
Computers | 6 |
Educational Technology | 6 |
Foreign Countries | 6 |
More ▼ |
Source
Author
Bahr, Ellen | 1 |
Baranauskas, M. Cecilia C. | 1 |
Beckett, George | 1 |
Brandt, D. Scott | 1 |
Cesarini, Paul | 1 |
Conley, Stephanie Scheer | 1 |
Englund, Lillian White | 1 |
Gray, Terry | 1 |
Hope, Andrew | 1 |
Howard, Elizabeth V. | 1 |
Howe, Grant | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 9 |
Postsecondary Education | 6 |
Elementary Secondary Education | 3 |
Audience
Administrators | 3 |
Teachers | 2 |
Media Staff | 1 |
Practitioners | 1 |
Location
United Kingdom | 3 |
Brazil | 2 |
California | 2 |
Germany | 2 |
Japan | 2 |
Ohio | 2 |
Turkey | 2 |
United States | 2 |
Arizona | 1 |
Asia | 1 |
Australia | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Washington, Mark Allen – ProQuest LLC, 2023
The need to protect confidential data stored in university enterprise information systems and to prevent infiltration through phishing cyber attacks by malicious individuals and organizations has emerged. The unfortunate target of phishing attacks is university employees and students with access to confidential information. This research specifies…
Descriptors: Systems Approach, Information Security, Computer Security, Confidentiality
Selami Aydin; Maryam Zeinolabedini – Online Submission, 2024
In line with the rapid advancement in educational technology, and the application of artificial intelligence (AI) in particular, the teaching and learning of the English language has undergone a significant transformation. This paper aims to explore students' perceptions of integrating AI into the English as a foreign language (EFL) learning…
Descriptors: Artificial Intelligence, Computer Software, Second Language Instruction, Second Language Learning
Pagano, Matthew Wallach – ProQuest LLC, 2013
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Descriptors: Patients, Health Services, Information Technology, Information Security
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Pereira, Roberto; Baranauskas, M. Cecilia C.; da Silva, Sergio Roberto P. – Educational Technology & Society, 2013
Social software is a growing reality worldwide and several authors are discussing its use to promote social interaction in learning contexts. Although problems regarding privacy, reputation, and identity are commonly reported in social software, an explicit concern regarding peoples' values is not a common practice in its design and adoption,…
Descriptors: Social Networks, Computer Software, Semiotics, Values
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
McSwain-Starrett, Lauren T.; Conley, Stephanie Scheer – EDUCAUSE Quarterly, 2011
Student computing is now mobile. For college students across the nation, convenient access to information--anytime, anywhere, on demand--has become not only a priority, but a necessity. To successfully serve the needs of this current generation of students, colleges and universities must recognize the trend and align services accordingly.…
Descriptors: College Students, Access to Information, Handheld Devices, Computer Software
Sheard, Reed – EDUCAUSE Quarterly, 2010
When the author was brought on as CIO of Westmont College in October 2008, the president, Board of Trustees, and campus environment made it clear that technology needed a major overhaul to meet the college's growing requirements. Also, these changes needed to happen without significantly increasing the IT budget or staff. Marketing Charts…
Descriptors: Problem Solving, Computer Mediated Communication, Educational Finance, Innovation
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Englund, Lillian White – Intervention in School and Clinic, 2009
This article discusses the development and use of an on-line portfolio process. It presents a background rationale for the need and effectiveness of a communication tool that supports the use of the portfolio process throughout the education of a child with identified disabilities. The process for developing the individualized Web page is…
Descriptors: Portfolios (Background Materials), Portfolio Assessment, Access to Information, Web Sites
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Kean, Sam – Chronicle of Higher Education, 2007
In this article, the author discusses a computer program called Psiphon which bypasses government filters undetected. The University of Toronto's Citizen Lab, a research center for digital media and politics, designed Psiphon for technology-savvy activists. Some technology-savvy activists use other open-source software, like Tor (which relies on…
Descriptors: Foreign Countries, Information Technology, Computer Software, Social Networks
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Bahr, Ellen – Computers in Libraries, 2007
What would technological librarians like to see in the next generation of Integrated Library Systems (ILS)? This question was asked of several well- known library technology experts, and their responses are presented in this article. Survey respondents expressed a clear desire for the following features and functionality: (1) Direct, read-only…
Descriptors: Libraries, Internet, Library Automation, Computer Mediated Communication
Previous Page | Next Page ยป
Pages: 1 | 2