NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
What Works Clearinghouse Rating
Showing 1 to 15 of 24 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Sotiroula Theodosi; Iolie Nicolaidou – Education and Information Technologies, 2025
The preventability of skin cancer stresses the need for primary prevention interventions early in life to help children realize how dangerous ultraviolet radiation (UVR) exposure can be. Internet of Things (IoT) devices can be used to measure UVR intensity in real-time to help children visualize it and understand the need for sun protection from…
Descriptors: Cancer, Prevention, Health Promotion, Health Behavior
Anthony K. Harvey – ProQuest LLC, 2021
The introduction of the Internet of Things (IoT) into educational institutions has necessitated the integration of IoT devices in the information technology (IT) infrastructural environment of educational institutions. Many IT leaders at educational institutions, however, lack strategies for integrating and deploying IoT devices in their…
Descriptors: Internet, Technology Integration, Information Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Said-Hung, Elias; Gonzalez-Prieto, Evaristo; Pallarès-Piquer, Marc – Technology, Pedagogy and Education, 2021
Numerous studies have examined the phenomenon of bullying. The development of information and communications technology (ICT) has enabled an emerging form of bullying known as cyberbullying. This article presents a case study of an Internet-focused bullying prevention programme in a Spanish secondary school with 627 students, from a…
Descriptors: Prevention, Bullying, Computer Mediated Communication, Information Technology
Bele, Julija Lapuh; Dimc, Maja; Rozman, David; Jemec, Andreja Sladoje – International Association for Development of the Information Society, 2014
The widespread use of mobile devices that enable Internet access increases the exposure of both individuals and organizations to cybercrime. This article addresses the issue of strategic prevention of cybercrime with the key focus on the measures to prevent cybercrime related to children and teenagers. The primary tool for such prevention is…
Descriptors: Consciousness Raising, Internet, Crime, Information Security
Roumani, Yaman – ProQuest LLC, 2012
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Descriptors: Computer Software, Risk, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Balsa, Ana I.; Gandelman, Néstor; Lamé, Diego – Journal of Child & Adolescent Substance Abuse, 2014
We analyzed individual and program characteristics associated with participation in an Information and Communication Technologies (ICT)-based substance use preventive intervention in Uruguay, South America. The intervention was directed at ninth- and tenth-grade students in 10 private schools in Montevideo. Participation in the program was…
Descriptors: Foreign Countries, Prevention, Individual Characteristics, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
von Marees, Nandoli; Petermann, Franz – School Psychology International, 2012
The use of information and communication technology (ICT) has not only brought advantages to mankind. One downside is the emergence and increase of cyberbullying in schools. Affecting students of all ages, teachers, parents, and other educators, this special form of bullying is an increasing challenge for schools. This article offers an overview…
Descriptors: Computer Uses in Education, Information Technology, Bullying, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Manning, Jessica; VanDeusen, Karen – Journal of American College Health, 2011
Western Michigan University's Suicide Prevention Program utilizes multiple technological components, including an online training course, a Web site, and 2 social networking Web site profiles, as integral aspects of a comprehensive program. This article discusses the development, maintenance, use, and impact of the technological aspects of this…
Descriptors: Prevention, Comprehensive Programs, Suicide, Internet
Jeong, Bong-Keun – ProQuest LLC, 2010
Digital piracy and the emergence of new distribution channels have changed the dynamics of supply chain coordination and created many interesting problems. There has been increased attention to understanding the phenomenon of consumer piracy behavior and its impact on supply chain profitability. The purpose of this dissertation is to better…
Descriptors: Music, Delivery Systems, Internet, Electronic Publishing
Stephens, Kim – Office of Safe and Drug-Free Schools, US Department of Education, 2011
Social Media is the use of social networking sites, messaging sites, texting, and other web-based or mobile technologies to support social interaction. Facebook is by far the most widely used social networking site. Twitter is by far the most widely used messaging site. The goals of this presentation are: (1) To provide an understanding of the…
Descriptors: Interpersonal Relationship, Communications, Emergency Programs, Social Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Prescott, Julie, Ed. – IGI Global, 2016
Diversity in the workforce can be attributed to both a popular, cultural shift and legislative intervention. Despite these forces, discrimination endures in all aspects of Western society from education to employment. Unequal pay and opportunities for promotion are symptoms of a systematic discrimination of individuals based on race and gender.…
Descriptors: Diversity, Racial Discrimination, Gender Discrimination, Social Change
Siegle, Del – Gifted Child Today, 2010
Many young people cannot remember a time before Instant Messaging (IM), cell phone text messaging, video conferencing, blogging, e-mailing, and MySpace and Facebook postings existed. Thanks to the ubiquitous nature of technology in the 21st century, digital natives are accustomed to seeing, and being seen, on a scale that was unimaginable by their…
Descriptors: Safety, Information Technology, Bullying, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Patchin, Justin W.; Hinduja, Sameer – Journal of School Health, 2010
Background: This article examines the relationship between middle school students' experience with cyberbullying and their level of self-esteem. Previous research on traditional bullying among adolescents has found a relatively consistent link between victimization and lower self-esteem, while finding an inconsistent relationship between offending…
Descriptors: Middle School Students, Bullying, Prevention, Internet
Demaray, Michelle K.; Brown, Christina F. – Communique, 2009
The school, playground, and neighborhood often come to mind when one thinks about bullying that occurs among children and teens. However, given the significant role technology plays in the lives of today's youth, the potential of these media to function as a venue for social interaction that includes victimization, or cyberbullying, also needs to…
Descriptors: School Psychologists, Interpersonal Relationship, Intervention, Prevention
Gale, Doug – Campus Technology, 2007
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Descriptors: Computer Security, Prevention, Guidelines, Higher Education
Previous Page | Next Page »
Pages: 1  |  2