Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 4 |
Descriptor
Author
Brar, Raj | 1 |
Donkers, Peter | 1 |
Dufresne, Aude | 1 |
Gillis, R. Peter | 1 |
Hatala, Marek | 1 |
Richards, Griff | 1 |
Waters, John K. | 1 |
Whitemarsh, Judith | 1 |
Wright, Peter W. | 1 |
Publication Type
Reports - Descriptive | 6 |
Guides - Non-Classroom | 3 |
Journal Articles | 3 |
Information Analyses | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 2 |
Higher Education | 1 |
Audience
Practitioners | 3 |
Administrators | 1 |
Policymakers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brar, Raj – BU Journal of Graduate Studies in Education, 2022
Social media is an important part of all of our lives. However, there is no requirement for students in Manitoba to receive formalized education in regards to social media and its usage in the K-12 Canadian curriculum instruction. Such formalized education is extremely important for adolescents to understand the multiple facets of social media…
Descriptors: Social Media, Educational Technology, Adolescents, Foreign Countries
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Richards, Griff; Donkers, Peter; Hatala, Marek; Dufresne, Aude – Interactive Learning Environments, 2007
Campus Canada promotes lifelong learning through the articulation of workplace and other experiential learning for academic credit. This paper describes the recent re-development of the Record of Learning (RoL) component of the Campus Canada's e-Portfolio System. In matching the academic members' desires for provision of secure e-transcripts with…
Descriptors: Foreign Countries, Validity, Competence, Experiential Learning
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment
Wright, Peter W. – 2000
Based on the author's presentation at the International Conference on Computer Based Learning in Science, this paper discuses some high profile areas of interest and concern in the educational use of information and communication technology (ICT). The paper is influenced partly by a series of nine government funded "Best Practices"…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Distance Education
Alberta Dept. of Education, Edmonton. – 1999
The information in this document is based on a study that Alberta Education commissioned on establishing technology systems that are responsive to the requirements of Alberta's Freedom of Information and Protection of Privacy Act (FOIPP). This document provides an overview of key issues and suggested strategies in the following areas: (1)…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Educational Administration
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education