Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 7 |
Computer Uses in Education | 7 |
Guidelines | 7 |
Internet | 6 |
Privacy | 3 |
Access to Information | 2 |
Educational Technology | 2 |
Elementary Secondary Education | 2 |
Policy Formation | 2 |
Access to Computers | 1 |
Administrator Responsibility | 1 |
More ▼ |
Source
American School Board Journal | 1 |
Computers & Education | 1 |
Journal of Instruction… | 1 |
Social Education | 1 |
TechTrends: Linking Research… | 1 |
Technology, Pedagogy and… | 1 |
Author
Bailey, Gerald D. | 1 |
Berson, Ilene R. | 1 |
Berson, Michael J. | 1 |
Butler, Rebecca P. | 1 |
Gavitt, Donna R. | 1 |
Littman, Marlyn Kemper | 1 |
Olivo, John J. | 1 |
Perks, Dennis J. | 1 |
Powell, Ken | 1 |
Pownell, David | 1 |
Russell, Terry | 1 |
More ▼ |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 4 |
Reports - Evaluative | 2 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Talab, Rosemary S.; Butler, Rebecca P. – TechTrends: Linking Research and Practice to Improve Learning, 2007
The concept of "publishing" has changed again, just in the last few years, due to YouTube, Blogger, Second Life, Flickr, and other new social networking tools (John Marshall Law School, 2005). Whether they are making it possible for everyone to view a video on YouTube on how to install a hard drive on a Mac, add a collaborative student writing…
Descriptors: Guidelines, Privacy, Copyrights, Internet
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
Pownell, David; Bailey, Gerald D. – American School Board Journal, 2001
Handheld computers are just beginning to be introduced in schools. Before adopting the latest innovation, administrators must ask careful questions about issues and implications regarding leadership, teaching and learning, staff development, technology support, planning, infrastructure, safety and security, ethics, evaluation, curriculum, change,…
Descriptors: Administrator Responsibility, Computer Security, Computer Uses in Education, Elementary Secondary Education
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Berson, Ilene R.; Berson, Michael J. – Social Education, 2006
Internet users continue to develop new ways of communicating online and disseminating information; one of these methods, the blog, also known as web log, has become a significant cultural phenomenon. Blogs offer an interactive medium for internet users to create and contribute content to the web. In some social studies classrooms, teachers are…
Descriptors: Social Studies, Current Events, Internet, Web Sites

Perks, Dennis J.; Gavitt, Donna R.; Olivo, John J. – Computers & Education, 1997
Developing an Internet acceptable use policy is the first step in bringing technological change to the classroom. This article defines educator's proactive responsibilities and provides a policy shell (privilege, "netiquette," security, vandalism, legal issues, warranties, and user agreements) to formulate individual school policies.…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Guidelines
Zirkle, Chris – 2001
The Internet offers trade and industrial (T&I) educators a wealth of readily available information for use as teaching aids, supplemental materials, and laboratory resources. These materials provide many distinct benefits; however, there are also several issues that must be addressed when using the Internet as an adjunct in teaching. These…
Descriptors: Access to Computers, Access to Information, Computer Security, Computer Uses in Education