NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)16
Source
T.H.E. Journal27
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 27 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
McCrea, Bridget; Weil, Marty – T.H.E. Journal, 2011
Across the U.S., innovative collaboration practices are happening in the cloud: Sixth-graders participate in literary salons. Fourth-graders mentor kindergarteners. And teachers use virtual Post-it notes to advise students as they create their own television shows. In other words, cloud computing is no longer just used to manage administrative…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2009
Biometrics has been making its way into school districts for the past decade. Biometric tools draw information from a person's identifying physical components, providing a virtually fail-safe level of protection for K-12 schools. In addition to their security uses, biometric systems are currently used in schools for cafeteria purchases, library…
Descriptors: Elementary Secondary Education, Computers, Internet, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2009
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Descriptors: Internet, School Districts, Computer Software, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2010
Open source software is poised to make a profound impact on K-12 education. For years industry experts have been predicting the widespread adoption of open source tools by K-12 school districts. They're about to be proved right. The impact may not yet have been profound, but it's fair to say that some open source systems and non-proprietary…
Descriptors: Elementary Secondary Education, Computer Software, Instructional Materials, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Schaffhauser, Dian – T.H.E. Journal, 2009
Hiring substitute teachers used to be an early-morning calling burden for staff members at schools in Oregon's Coos Bay School District. Now that work has been passed off to Aesop, a service from Frontline Placement Technologies, which springs into action upon receiving a notification, either by call or log-in, from a teacher reporting an absence.…
Descriptors: Computer Software, School Districts, Educational Technology, Substitute Teachers
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2009
In this article, the author talks about the 3D virtual world known as Second Life and its potential as a learning platform. In the last few years, many colleges, universities, and libraries have established resources in what has become the preeminent multiuser virtual environment. Today, more than 100 Second Life "regions" are used for educational…
Descriptors: Educational Resources, Social Networks, Computer Simulation, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Sturgeon, Julie – T.H.E. Journal, 2008
Acting on information from students who reported seeing a classmate looking at inappropriate material on a school computer, school officials used forensics software to plunge the depths of the PC's hard drive, searching for evidence of improper activity. Images were found in a deleted Internet Explorer cache as well as deleted file space.…
Descriptors: Computer Software, Computers, Internet, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Villano, Matt – T.H.E. Journal, 2008
The Children's Internet Protection Act (CIPA) requires any school or library receiving funding from the federal E-Rate program to deploy web filtering technology to prevent users from viewing objectionable material while they are using the institution's computers. However, opponents of web filtering legislation question whether or not mandated…
Descriptors: Internet, Web Sites, Computer Security, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Bolch, Matt – T.H.E. Journal, 2008
Imagine school district staff inputting school data and sharing it in real time, managing teacher absences and arranging substitutes from the comfort of home, or deploying IT personnel to the right site at the right time to tackle the highest-priority jobs first. The concept of managing applications from anywhere with a network connection, known…
Descriptors: Teacher Attendance, Computer Software, Internet, Models
Peer reviewed Peer reviewed
Direct linkDirect link
Demski, Jennifer – T.H.E. Journal, 2009
The presence of a bilingual educator is proving pivotal to the success of technology initiatives aimed at developing Spanish-speaking students' grasp of both the concepts and the language of mathematics. This article features Ginny Badger, a teaching assistant at Glenwood Springs High School in Glenwood Springs, Colorado, who sacrificed her…
Descriptors: Speech Communication, Second Language Learning, Computer Software, Program Effectiveness
Peer reviewed Peer reviewed
Martin, Kelly – T.H.E. Journal, 2004
It used to be that Internet threats were aimed at disabling their targets. The most common payload of yesterday's viruses, worms and other malicious code either caused system instability or, perhaps, deleted certain files. In many cases, these threats announced their arrival by flashing messages on the computer screen or causing some other…
Descriptors: Computer Security, Computer Software, Privacy, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2008
Data integration is one of the single most challenging tasks any district can face. Fortunately for school districts throughout the country with data scattered in disparate systems, an open specification known as the Schools Interoperability Framework (SIF) is mitigating that challenge. SIF has emerged as a cornerstone of K-12 data warehousing,…
Descriptors: Elementary Secondary Education, Computer Software, School Districts, Educational Cooperation
Peer reviewed Peer reviewed
Rajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet
Peer reviewed Peer reviewed
Ozkan, Betul C.; Gunay, Vedat – T.H.E. Journal, 2004
Emerging technologies are quickly becoming part of daily learning and teaching endeavors in academia. Due to the access to certain high-tech tools educators must learn how to integrate these tools in educational settings. However, many also encounter problems and weaknesses in the same high-tech environment that uses and delivers information…
Descriptors: Viruses, Computer Security, Higher Education, Computer Networks
Previous Page | Next Page ยป
Pages: 1  |  2