Publication Date
| In 2026 | 0 |
| Since 2025 | 10 |
| Since 2022 (last 5 years) | 62 |
| Since 2017 (last 10 years) | 119 |
| Since 2007 (last 20 years) | 316 |
Descriptor
Source
Author
| Goldsborough, Reid | 6 |
| Villano, Matt | 5 |
| Descy, Don E. | 4 |
| Hope, Andrew | 4 |
| Panettieri, Joseph C. | 3 |
| Almes, Guy T. | 2 |
| Anderson, Jimmeka | 2 |
| Bennett, Cedric | 2 |
| Benson, Allen C. | 2 |
| Botterman, Maarten | 2 |
| Breeding, Marshall | 2 |
| More ▼ | |
Publication Type
Education Level
Audience
| Administrators | 14 |
| Teachers | 14 |
| Practitioners | 13 |
| Parents | 7 |
| Media Staff | 6 |
| Policymakers | 3 |
| Students | 3 |
| Counselors | 1 |
Location
| United Kingdom | 13 |
| Turkey | 12 |
| United States | 10 |
| Australia | 9 |
| California | 8 |
| Texas | 8 |
| Canada | 7 |
| Spain | 7 |
| India | 6 |
| Massachusetts | 6 |
| Ohio | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Doerr-Stevens, Candance; Beach, Richard; Boeser, Elizabeth – English Journal, 2011
This article discusses how students use online role-play to collaborate and change real school policy. Playing different characters in an online role-play, students explore controversial aspects of Internet filtering and adopt a plan to change their school's policy. Through engaging in collaborative argumentation during their role-play, students…
Descriptors: Online Courses, Peer Groups, School Policy, Role Playing
Floros, Georgios D.; Siomos, Konstantinos E.; Fisoun, Virginia; Dafouli, Evaggelia; Geroukalis, Dimitrios – Journal of School Health, 2013
Background: The introduction of new technological media worldwide has had a number of unfortunate side effects for some adolescents, including cases of bullying others through the new media (cyberbullying) and over-involvement to the point of addiction. We examine the epidemiology of cyberbullying in a Greek setting, compare it with earlier data,…
Descriptors: Adolescents, Computer Mediated Communication, Bullying, Peer Relationship
McDonald, Aleecia M. – ProQuest LLC, 2010
As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…
Descriptors: Reading Comprehension, Economic Research, Risk, Internet
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics
Chow, Chi Yin – ProQuest LLC, 2010
Location-based services (LBS for short) providers require users' current locations to answer their location-based queries, e.g., range and nearest-neighbor queries. Revealing personal location information to potentially untrusted service providers could create privacy risks for users. To this end, our objective is to design a privacy-preserving…
Descriptors: Reaction Time, Privacy, Geographic Information Systems, Geographic Location
Wang, Shudong; Heffernan, Neil – British Journal of Educational Technology, 2010
Pedagogical theories and the applications of information technology for language learning have been widely researched in various dimensions. However, ethical issues, such as online privacy and security, and learners' personal data disclosure, are not receiving enough research attention. The perceptions and attitudes from those who participate in…
Descriptors: Information Technology, Educational Technology, Ethics, Second Language Learning
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
Descriptors: Internet, Computer Mediated Communication, Privacy, Computer Security
American Journal of Distance Education, 2010
David Foster is the founder of Kryterion, an Internet test administration company, and currently serves there as chief scientist and executive vice president. He is the author of numerous articles for industry trade journals and textbooks and sits on the Council for the International Test Commission. In this interview, Foster talks about his…
Descriptors: Test Construction, High Stakes Tests, Educational Technology, Interviews
Anastasiades, Panagiotes S.; Vitalaki, Elena – Educational Technology & Society, 2011
The introduction of the Internet at schools has raised new pedagogical challenges facing educators trying to ensure children's awareness of the possible dangers when surfing the Web. This article aims to investigate how teachers evaluate the possible dangers that students might face when surfing the Net for various educational or interpersonal…
Descriptors: Foreign Countries, Internet, Teacher Role, Elementary Education
Allison, Debra H.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2008
This article presents the ninth annual EDUCAUSE Current Issues Survey results, which show a good deal of movement among the most critical challenges facing campus information technology leaders in 2008. Thirty-two percent (589) of 1,845 EDUCAUSE primary member representatives responded to an e-mail invitation to complete the web-based survey in…
Descriptors: Information Technology, Internet, Surveys, Higher Education
Endicott-Popovsky, Barbara – Teacher Librarian, 2009
Without specific education in online safety and security issues, putting any limitations on access could seem counter to what a librarian is trained to do. At a cybersecurity workshop sponsored by Washington Library Media Association (WLMA) last October, an informal show of hands from attending teacher-librarians uncovered a range of motivations…
Descriptors: Safety, Internet, School Policy, Librarians
Consortium for School Networking (NJ1), 2011
Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…
Descriptors: Safety, Laws, School Districts, Internet
Dessoff, Alan – Education Digest: Essential Readings Condensed for Quick Review, 2010
Until this year, the Oregon Department of Education ran a central portal of thousands of learning resources that required all teachers and students to have an email address as authentication for security purposes. Because many districts didn't offer student email, the learning materials were not available to everyone. In April, Oregon became the…
Descriptors: Internet, State Departments of Education, Electronic Mail, Systems Approach
Roberts, Kevin J. – Exceptional Parent, 2010
Parents need to be aware of the dangers and the opportunities the cyber world offers. Video games are being used in the classroom. Commerce is increasingly taking place online and computers are indispensable in the workplace. A cyber-oriented child possesses some great advantages. The author urges parents to become experts in the cyber world so…
Descriptors: Video Games, Internet, Parents, Teaching Methods

Peer reviewed
Direct link
