Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 6 |
Since 2016 (last 10 years) | 8 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Security | 15 |
Elementary Secondary Education | 15 |
Higher Education | 15 |
Educational Technology | 8 |
Computer Uses in Education | 7 |
Foreign Countries | 6 |
Computer Science Education | 5 |
Distance Education | 5 |
Internet | 5 |
Telecommunications | 5 |
Artificial Intelligence | 4 |
More ▼ |
Source
Author
Littman, Marlyn Kemper | 2 |
Adrian Curaj | 1 |
Alina Iura | 1 |
Bruhn, Mark | 1 |
Cashman, Thomas J. | 1 |
Cezar Hâj | 1 |
Cosmin Holeab | 1 |
Cusak, Austin | 1 |
Dorin Cote? | 1 |
Felisa Tibbitts | 1 |
Gettes, Michael | 1 |
More ▼ |
Publication Type
Education Level
Audience
Policymakers | 1 |
Practitioners | 1 |
Students | 1 |
Teachers | 1 |
Location
Germany | 2 |
Italy | 2 |
Algeria | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Bulgaria | 1 |
Canada | 1 |
China | 1 |
Connecticut | 1 |
Denmark | 1 |
More ▼ |
Laws, Policies, & Programs
Coronavirus Aid Relief and… | 1 |
Elementary and Secondary… | 1 |
United Nations Convention on… | 1 |
Universal Declaration of… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Saah Agyemang-Badu; Felisa Tibbitts; Sage Phillips – Current Issues in Comparative Education, 2024
The treatment of artificial intelligence (AI) in the field of education has so far been typically characterized by (a) information about how AI can assist educators in carrying out their work, and (b) concerns about the misuse of AI by learners, for example, concerning plagiarism. The links between AI and ethics within the field of education are…
Descriptors: Artificial Intelligence, Elementary Secondary Education, Higher Education, Ethics
Cusak, Austin – Journal of Cybersecurity Education, Research and Practice, 2023
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a…
Descriptors: Internet, Computer Security, Information Security, Labor Force Development
Office of Inspector General, US Department of Education, 2021
The Inspector General Act of 1978 (Public Law 95-452), as amended, requires that the Inspector General report semiannually to the Congress on the activities of the Office of Inspector General (OIG) during the 6-month periods ending March 31 and September 30. This Semiannual Report presents the activities and accomplishments of the U.S. Department…
Descriptors: Federal Legislation, Federal Government, Public Agencies, Federal Aid
Adrian Curaj; Cezar Hâj; Cosmin Holeab; Irina Geanta; Alina Iura; Dorin Cote?; Oana ?în?ar – European Union, 2025
The present report overseen by the Executive Agency for Higher Education, Research, Development and Innovation Funding (UEFISCDI) on behalf of the European Commission and the European Education and Culture Executive Agency as part of the contract for the implementation of the European Digital Education Hub, is the third report in a series…
Descriptors: Foreign Countries, Educational Innovation, Electronic Learning, Educational Practices
US House of Representatives, 2018
This document records testimony from a joint meeting of the Subcommittee on Cybersecurity and Infrastructure Protection and the Subcommittee on Higher Education and Workforce Development regarding public-private solutions to educating a cyber workforce. Member statements were presented by: (1) Honorable John Ratcliffe, Chairman, Subcommittee on…
Descriptors: Labor Force Development, Computer Security, Higher Education, Hearings
Mack Shelley, Editor; Omer Tayfur Ozturk, Editor – International Society for Technology, Education, and Science, 2024
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on April 27-30, 2024, in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, discuss theoretical and…
Descriptors: STEM Education, Second Language Learning, Second Language Instruction, English (Second Language)
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Nunes, Miguel Baptista, Ed.; Isaias, Pedro, Ed. – International Association for Development of the Information Society, 2019
These proceedings contain the papers and posters of the International Conference on e-Learning (EL) 2019, which was organised by the International Association for Development of the Information Society and co-organised by the Instituto Superior de Engenharia do Porto, in Porto, Portugal, July 17-19, 2019. The EL 2019 conference aims to address the…
Descriptors: Educational Technology, Technology Uses in Education, Mathematics Instruction, Cooperation

Bruhn, Mark; Gettes, Michael; West, Ann – Educause Quarterly, 2003
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Elementary Secondary Education
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Littman, Marlyn Kemper – Journal of Online Learning, 1998
Explores capabilities of extranets (collaborative information networks between partner institutions) from the perspective of the school and university environment. Introduces distinctive features. Presents strategies and techniques for facilitating the extranet design and implementation process and delineates tactics for safeguarding extranets…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Shelly, Gary B.; Cashman, Thomas J.; Gunter, Randolph E.; Gunter, Glenda A. – 1999
Intended for use in an introductory computer course for educators, this textbook contains the following chapters: (1) "Introduction to Using Computers in Education"; (2) "Communications, Networks, the Internet, and the World Wide Web"; (3) "Software Applications for Education,"; (4) "Hardware Applications for…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Educational Technology
Wright, Peter W. – 2000
Based on the author's presentation at the International Conference on Computer Based Learning in Science, this paper discuses some high profile areas of interest and concern in the educational use of information and communication technology (ICT). The paper is influenced partly by a series of nine government funded "Best Practices"…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Distance Education
Race, Phil; McDowell, Steve – 1996
This how-to manual is intended to ease the transition to the information technology age even for those teachers who have no previous knowledge or experience with computers. Written in a concise, numbered paragraph format, the text uses simple nontechnical language. The first chapter titled, "Getting Started with Computers," covers choosing and…
Descriptors: Computer Anxiety, Computer Assisted Instruction, Computer Literacy, Computer Peripherals
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers