NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Michael Adorjan; Rosemary Ricciardelli; Mohana Mukherjee – British Journal of Educational Studies, 2024
Restorative practices are gaining traction as alternative approaches to student conflict and harm in schools, potentially surpassing disciplinary methods in effectiveness. In the current article, we contribute to the evolving understanding of restorative practices in schools by examining qualitative responses from educators regarding restorative…
Descriptors: Computer Security, Restorative Practices, Bullying, Computer Mediated Communication
Peer reviewed Peer reviewed
Direct linkDirect link
Cavus, Nadire; Ercag, Erinc – British Journal of Educational Technology, 2016
There has been an increase in the vulnerability in Internet security, and the unconscious usage of the Internet is a very important issue throughout the world as it is in Cyprus today. The best way to solve such an issue would be to make people aware of this situation. Based on this idea, teachers should firstly be trained to use the Internet in a…
Descriptors: Foreign Countries, Self Efficacy, Internet, Safety
DeFranco, Joanna F. – Techniques: Connecting Education and Careers (J1), 2011
Internet security is an important topic for educators due to curriculums now incorporating tools such as the Internet, Google docs, e-portfolios, and course management systems. Those tools require students to spend more time online, where they are susceptible to manipulation or intimidation if they do not stay on task. Kids of all ages lack…
Descriptors: Management Systems, Safety, Internet, Teachers
Race, Phil; McDowell, Steve – 1996
This how-to manual is intended to ease the transition to the information technology age even for those teachers who have no previous knowledge or experience with computers. Written in a concise, numbered paragraph format, the text uses simple nontechnical language. The first chapter titled, "Getting Started with Computers," covers choosing and…
Descriptors: Computer Anxiety, Computer Assisted Instruction, Computer Literacy, Computer Peripherals