Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 18 |
Descriptor
Computer Security | 20 |
Computer Uses in Education | 20 |
Web Sites | 20 |
Internet | 15 |
Computer Mediated… | 10 |
Computer Software | 8 |
Educational Technology | 8 |
Access to Information | 6 |
Privacy | 6 |
Safety | 6 |
Electronic Mail | 5 |
More ▼ |
Source
Author
Smith, Carol L., Ed. | 2 |
Smith, Peter, Ed. | 2 |
Berson, Ilene R. | 1 |
Berson, Michael J. | 1 |
Blazer, Christie | 1 |
Brown, Abbie | 1 |
Cesarini, Paul | 1 |
Collins, Hilton | 1 |
Englund, Lillian White | 1 |
Green, Tim | 1 |
Grush, Mary | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Descriptive | 12 |
Opinion Papers | 4 |
Books | 3 |
Collected Works - Proceedings | 2 |
Guides - Classroom - Teacher | 2 |
Reports - Evaluative | 2 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 6 |
Elementary Secondary Education | 5 |
Elementary Education | 1 |
Postsecondary Education | 1 |
Audience
Teachers | 2 |
Administrators | 1 |
Location
California | 1 |
Florida | 1 |
South Carolina | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Grush, Mary – Campus Technology, 2009
As colleges and universities rely more heavily on software as a service (SaaS), they're putting more critical data in the cloud. What are the security issues, and how are cloud providers responding? "Campus Technology" ("CT") went to three higher ed SaaS vendors--Google, IBM, and TopSchool--and asked them to share their thoughts about the state of…
Descriptors: Higher Education, Computer Software, Educational Technology, Computer Uses in Education
Linworth, 2012
If you're new to running a library or looking for a refresher, this book can serve as your first reference source for school library operation, providing overview information on a wealth of topics, lists of resources for more in-depth information, and coverage of current topics such as Web 2.0, fundraising, digital booktalks, and cybersafety.…
Descriptors: Fund Raising, Library Administration, School Libraries, Library Automation
Mott, Jonathan – EDUCAUSE Quarterly, 2010
Learning management systems (LMSs) have dominated the teaching and learning landscape in higher education for the past decade, with a recent Delta Initiative report indicating that more than 90 percent of colleges and universities have a standardized, institutional LMS implementation. While the LMS has become central to the business of colleges…
Descriptors: Higher Education, Web Sites, Open Education, Management Systems
Blazer, Christie – Research Services, Miami-Dade County Public Schools, 2009
More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…
Descriptors: Web Sites, Social Networks, Information Technology, Internet
de Abreu, Belinha S. – Peter Lang New York, 2011
This book, a resource for educators, uses the theme of media literacy as a lens through which to view and discuss social networking and Web 2.0 environments. There is ongoing and positive research on the participatory culture created by youth who are heavily involved in the new digital technologies, yet schools tend to avoid these mediums for fear…
Descriptors: Media Literacy, Internet, Social Networks, Electronic Publishing
Villano, Matt – T.H.E. Journal, 2008
The Children's Internet Protection Act (CIPA) requires any school or library receiving funding from the federal E-Rate program to deploy web filtering technology to prevent users from viewing objectionable material while they are using the institution's computers. However, opponents of web filtering legislation question whether or not mandated…
Descriptors: Internet, Web Sites, Computer Security, Computer Uses in Education
Englund, Lillian White – Intervention in School and Clinic, 2009
This article discusses the development and use of an on-line portfolio process. It presents a background rationale for the need and effectiveness of a communication tool that supports the use of the portfolio process throughout the education of a child with identified disabilities. The process for developing the individualized Web page is…
Descriptors: Portfolios (Background Materials), Portfolio Assessment, Access to Information, Web Sites
Sharma, Priya; Xie, Ying – Journal of Asynchronous Learning Networks, 2008
Recently, attempts have been made to use Weblogs and other personal webpublishing technologies to support individual and social reflection in higher education. Weblogs can be highly individual and reflective in nature, and students' experiences and perceptions of the technology and practice are of primary importance in furthering educational use.…
Descriptors: Student Attitudes, Data Analysis, Electronic Publishing, Web Sites
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Nackerud, Shane; Scaletta, Kurtis – New Directions for Student Services, 2008
Blogs are a hot topic in academia. A search on "blog" in the "Chronicle of Education's" Web site returns nearly two hundred articles, covering such topics as the dangers an impolitic blog can do to an institution's leaders (Read, 2006) or the blogger's career (Tribble, 2005) and the mutual use of blogs by instructors to lambaste students (Lipka,…
Descriptors: Higher Education, Web Sites, Electronic Publishing, College Libraries
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Tynes, Brendesha M. – Journal of Adolescent Research, 2007
Many Internet safety and parenting experts suggest that parents prohibit their teens from social networking sites and other online spaces where predators may lurk. But we may do adolescents a disservice when we curtail their participation in these spaces, because the educational and psychosocial benefits of this type of communication can far…
Descriptors: Safety, Internet, Adolescents, Social Networks
Olagunju, Amos O. – Online Submission, 2008
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…
Descriptors: Safety, Parent Participation, Parent Role, Parent School Relationship
Previous Page | Next Page ยป
Pages: 1 | 2