Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 8 |
Computer Uses in Education | 8 |
Educational Policy | 8 |
Educational Technology | 5 |
Internet | 5 |
Foreign Countries | 4 |
Computer Software | 3 |
Ethics | 3 |
Federal Legislation | 3 |
Safety | 3 |
Technology Integration | 3 |
More ▼ |
Source
Technology, Pedagogy and… | 2 |
Educause Quarterly | 1 |
International Journal of… | 1 |
Journal of Educational… | 1 |
Journal of Learning for… | 1 |
Knowledge Quest | 1 |
Peter Lang New York | 1 |
Author
Fan, Andy | 1 |
Frolick, Mark N. | 1 |
Garland, Virginia E. | 1 |
Hamisi Mfaume | 1 |
Hope, Andrew | 1 |
Jackson, Robert | 1 |
Margareth Bilinga | 1 |
Miller, Beth | 1 |
Powell, Ken | 1 |
Russell, Terry | 1 |
Wickens, Cathy | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 4 |
Reports - Descriptive | 2 |
Books | 1 |
Guides - Classroom - Teacher | 1 |
Reports - Evaluative | 1 |
Education Level
Elementary Secondary Education | 4 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
United Kingdom | 2 |
China | 1 |
Macau | 1 |
Tanzania | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Hamisi Mfaume; Margareth Bilinga – Journal of Learning for Development, 2024
The invention of digital ICT devices is one of the most important developments in the history of humankind, and education can greatly benefit from it. However, cyber ethics violations by teachers have become prevalent and are expected to increase unless measures are taken. This study explored education stakeholders' perspectives on ways to promote…
Descriptors: Foreign Countries, Secondary School Teachers, Stakeholders, Computer Security
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
de Abreu, Belinha S. – Peter Lang New York, 2011
This book, a resource for educators, uses the theme of media literacy as a lens through which to view and discuss social networking and Web 2.0 environments. There is ongoing and positive research on the participatory culture created by youth who are heavily involved in the new digital technologies, yet schools tend to avoid these mediums for fear…
Descriptors: Media Literacy, Internet, Social Networks, Electronic Publishing
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Garland, Virginia E. – Journal of Educational Technology Systems, 2010
What is the school principal's role in ensuring ethical technology use while promoting the use of wireless and advanced technologies in instruction? The rapid advances in technology in only the past 5 years, including the increase in laptops and smart phones, have transformed both educational practices and the role of the school principal as…
Descriptors: Educational Practices, Moral Issues, Student Diversity, Ethics
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law

Jackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Hope, Andrew – Technology, Pedagogy and Education, 2008
In the last decade, Internet provision has become widespread within schools in many economically developed countries. Proponents of such technology have stressed the potential benefits to be gained from innovative teaching and learning opportunities. Yet, herein purity and danger are seen to co-exist, with unregulated "pollutants"…
Descriptors: Internet, Foreign Countries, Discourse Analysis, Technology Integration