NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Straub, Jeremy – Journal of Educational Technology Systems, 2014
The development of software for spacecraft represents a particular challenge and is, in many ways, a worst case scenario from a design perspective. Spacecraft software must be "bulletproof" and operate for extended periods of time without user intervention. If the software fails, it cannot be manually serviced. Software failure may…
Descriptors: Comparative Analysis, Computer Software, Computer Science Education, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Shaffer, Steven C. – Online Journal of Distance Learning Administration, 2012
Assessment is an important part of distance education (DE). As class sizes get larger and workloads increase, the IT infrastructure and processes used for DE assessments become more of an issue. Using the BS ISO/IEC 23988:2007 Standard for the use of technology in the delivery of assessments as a guide, this paper describes a rational approach to…
Descriptors: Distance Education, Educational Technology, Disadvantaged, Quality Assurance
Peer reviewed Peer reviewed
Direct linkDirect link
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
Riley, Sheila – Technology & Learning, 2007
It is not always easy to find the balance between protecting students from Internet dangers and distractions and reaping its benefits--but it is certainly on every district's tech priority list. Sharnell Jackson, chief e-learning officer for the 415,000-student Chicago Public Schools, and Miguel Guhlin, director of instructional technology…
Descriptors: Computer Security, School Safety, Computer Mediated Communication, Parent Education
WCET, 2008
Much attention has been focused on the accountability, student learning outcomes, transfer of credit, and illegal file sharing provisions of the two related bills that have moved through the U.S. Senate and the House of Representatives to amend and extend the provisions of the 1965 Higher Education Act (S. 1642 and H.R. 4137). One of the…
Descriptors: Higher Education, Educational Technology, Distance Education, Integrity
Peer reviewed Peer reviewed
Direct linkDirect link
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
Peer reviewed Peer reviewed
Perks, Dennis J.; Gavitt, Donna R.; Olivo, John J. – Computers & Education, 1997
Developing an Internet acceptable use policy is the first step in bringing technological change to the classroom. This article defines educator's proactive responsibilities and provides a policy shell (privilege, "netiquette," security, vandalism, legal issues, warranties, and user agreements) to formulate individual school policies.…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Guidelines