Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 26 |
Descriptor
Access to Information | 40 |
Computer Security | 40 |
Information Technology | 40 |
Internet | 18 |
Privacy | 12 |
Computer Networks | 11 |
Foreign Countries | 11 |
Higher Education | 11 |
Information Management | 11 |
Computer Mediated… | 10 |
Computer Software | 9 |
More ▼ |
Source
Author
Amin, Rohan Mahesh | 1 |
Anderson, Catherine L. | 1 |
Aytaç, Tufan | 1 |
Bahr, Ellen | 1 |
Beer, Robert | 1 |
Bernbom, Gerald | 1 |
Bingbing Di | 1 |
Camp, John S. | 1 |
Carlson, Scott | 1 |
Cesarini, Paul | 1 |
Cole, Timothy W. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 16 |
Postsecondary Education | 8 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
High Schools | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 4 |
Administrators | 1 |
Media Staff | 1 |
Location
Australia | 3 |
Canada | 3 |
Ohio | 3 |
California | 2 |
Florida | 2 |
Turkey | 2 |
Asia | 1 |
Brazil | 1 |
China | 1 |
Connecticut | 1 |
Costa Rica | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Gang Zhao; Hui He; Bingbing Di; Qingqing Guo – Education and Information Technologies, 2024
With the rapid development of information technology, various online education platforms support the sharing of digital educational resources. Because digital educational resources are simple to duplicate and disseminate quickly, there exists copyright infringement, which threatens the interests of copyright owners. In addition, the existing…
Descriptors: Educational Resources, Technology Uses in Education, Technological Advancement, Copyrights
Aytaç, Tufan; Erdem, Mustafa – Online Submission, 2019
The use of Information and Communication Technologies (ICT) is rapidly spreading among high school students. These technologies provide the students to gain learning experiences and also involve many dangers such as addiction, loneliness and stress. The aim of this study is to examine awareness levels of different types of high school students…
Descriptors: High School Students, Computer Security, Learning Experience, Information Technology
Kansu, Ceren Çevik; Öksüz, Yücel – Journal of Education and Training Studies, 2019
This study was aimed to determine of their perceptions and levels of digital citizenship for pre-service classroom teachers. The study was conducted with 76 senior pre-service classroom teachers at Education Faculty of B. U. The study is survey research. In this research, "The Digital Citizenship Scale" developed by Kocadag (2012) was…
Descriptors: Preservice Teachers, Student Attitudes, Technological Literacy, Information Technology
Pagano, Matthew Wallach – ProQuest LLC, 2013
The conversion of paper-based medical records into electronic formats is set to bring many benefits to healthcare. This includes creating a more seamless exchange of electronic health records (EHRs) between providers, improving healthcare while lowering its costs, and providing patients with increased access to their EHRs. As more medical…
Descriptors: Patients, Health Services, Information Technology, Information Security
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Kligiene, Stanislava Nerute – Informatics in Education, 2012
The paper surveys the risks and benefits which the user faces in the networked environment and how those challenges can be overcome. The question is how to measure the potential or benefits of such a complex phenomenon--the collaborative cross-domains in social media. As one of the solutions we propose to consider this in the context of digital…
Descriptors: Social Networks, Data Collection, Privacy, Computer Mediated Communication
US Department of Education, 2018
The Department of Education Strategic Plan for Fiscal Years 2018-2022 describes the policy and operational priorities for the agency. The Plan details the Department's strategic goals and objectives over the next four years. The Plan also provides an overview of our Fiscal Year 2018-2019 Agency Priority Goals.
Descriptors: Strategic Planning, Educational Objectives, Elementary Secondary Education, Educational Improvement
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Sheard, Reed – EDUCAUSE Quarterly, 2010
When the author was brought on as CIO of Westmont College in October 2008, the president, Board of Trustees, and campus environment made it clear that technology needed a major overhaul to meet the college's growing requirements. Also, these changes needed to happen without significantly increasing the IT budget or staff. Marketing Charts…
Descriptors: Problem Solving, Computer Mediated Communication, Educational Finance, Innovation
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services