Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 3 |
| Information Technology | 3 |
| Observation | 3 |
| Access to Computers | 1 |
| Action Research | 1 |
| Class Activities | 1 |
| College Faculty | 1 |
| College Instruction | 1 |
| College Students | 1 |
| Computer Science | 1 |
| Computer Software | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Dissertations/Theses -… | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 1 |
| Secondary Education | 1 |
Audience
Location
| South Africa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ramorola, M. Z. – Africa Education Review, 2013
South African teachers are faced with challenges in integrating technology effectively into a coherent framework at school level. There seems to be little evidence of technology integration into classroom activities such as systematic planning and implementation of lessons that require learners to think critically, work collaboratively, and use…
Descriptors: Teaching Methods, Technology Integration, Secondary School Teachers, Secondary School Students
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security

Peer reviewed
Direct link
