NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 10 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hans Kaushik; Smriti Kaushik – Education and Information Technologies, 2024
The involvement of technology in the education domain has transformed the traditional system in many countries. The need was realized when 300 million students in India itself were pushed to move from traditional to various digital education platforms during the pandemic. There has been an essential emphasis given to the promotion of digital based…
Descriptors: Foreign Countries, Electronic Learning, Higher Education, Technology Uses in Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hamisi Mfaume; Margareth Bilinga – Journal of Learning for Development, 2024
The invention of digital ICT devices is one of the most important developments in the history of humankind, and education can greatly benefit from it. However, cyber ethics violations by teachers have become prevalent and are expected to increase unless measures are taken. This study explored education stakeholders' perspectives on ways to promote…
Descriptors: Foreign Countries, Secondary School Teachers, Stakeholders, Computer Security
White, Kerry-Ann – ProQuest LLC, 2012
Given the lack of computer diffusion studies in the Caribbean, and coupled with the necessity to understand Jamaica in efforts to get a clearer global representation of the digital divide, this study takes an exploratory approach and examines the differences of the computer technology adoption and diffusion attitudes and viewpoints between the…
Descriptors: Foreign Countries, Educational Technology, Information Technology, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Ramorola, M. Z. – Africa Education Review, 2013
South African teachers are faced with challenges in integrating technology effectively into a coherent framework at school level. There seems to be little evidence of technology integration into classroom activities such as systematic planning and implementation of lessons that require learners to think critically, work collaboratively, and use…
Descriptors: Teaching Methods, Technology Integration, Secondary School Teachers, Secondary School Students
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Peer reviewed Peer reviewed
Direct linkDirect link
von Munkwitz-Smith, Jeff; West, Ann – College and University, 2004
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Descriptors: Access to Information, Identification, Information Technology, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy