Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Computers | 4 |
Student Records | 4 |
Federal Legislation | 3 |
Internet | 3 |
Privacy | 3 |
Access to Computers | 2 |
Child Safety | 2 |
Competency Based Education | 2 |
Computer Software | 2 |
Confidential Records | 2 |
More ▼ |
Author
Foster, Andrea L. | 1 |
Nixon, Andrea | 1 |
Publication Type
Reports - Descriptive | 3 |
Guides - General | 2 |
Journal Articles | 2 |
Opinion Papers | 1 |
Translations | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Parents | 2 |
Location
Virginia | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Individuals with Disabilities… | 2 |
Social Security | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Office of Educational Technology, US Department of Education, 2020
Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and weaknesses. Today's digital tools and resources support and enhance learning at home and in the…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Office of Educational Technology, US Department of Education, 2020
This guide is the Spanish version of the "Parent and Family Digital Learning Guide". Technology, when used appropriately, can empower learning, engage and motivate students, and help make learning interactive. Students can benefit from educational technology because it can personalize instruction and adapt to their strengths and…
Descriptors: Educational Technology, Technology Uses in Education, Online Courses, Teaching Methods
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers