Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 6 |
Computer Uses in Education | 6 |
Legal Responsibility | 6 |
Computer Mediated… | 4 |
Educational Technology | 4 |
Internet | 4 |
Ethics | 3 |
Access to Computers | 2 |
Computer Software | 2 |
Foreign Countries | 2 |
Behavior | 1 |
More ▼ |
Author
Brown, Abbie | 1 |
Brown, David S. | 1 |
Green, Tim | 1 |
Lafee, Scott | 1 |
Lesisko, Lee James | 1 |
Lobodzinski, Suave, Ed. | 1 |
Robinson, LeAnne K. | 1 |
Tomek, Ivan, Ed. | 1 |
Wang, Tao | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Reports - Research | 2 |
Collected Works - Proceedings | 1 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Education Level
Elementary Secondary Education | 2 |
Audience
Administrators | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Canada | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
Trends in International… | 1 |
What Works Clearinghouse Rating
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Lesisko, Lee James – 2003
This study analyzes the controversy of software piracy in education. It begins with a real world scenario that presents the setting and context of the problem. The legalities and background of software piracy are explained and true court cases are briefly examined. Discussion then focuses on explaining why individuals and organizations pirate…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Costs
Lafee, Scott – School Administrator, 2005
In an era of digital technologies, school districts find themselves on a cutting edge, one that slices both ways. Technological tools like the Internet, e-mail, networked computers and such have revolutionized the way children are taught and schools are run, but they also have created new management challenges and ethical issues that many school…
Descriptors: Educational Technology, Computer Uses in Education, Computer Security, Ethics
Lobodzinski, Suave, Ed.; Tomek, Ivan, Ed. – 1997
The 1997 WebNet conference addressed research, new developments, and experiences related to the Internet and intranets. The 257 contributions of WebNet 97 contained in this proceedings comprise the full and short papers accepted for presentation at the conference. Included are positions papers by leading experts in the field; descriptions of ideas…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Computer System Design