Publication Date
| In 2026 | 0 |
| Since 2025 | 10 |
| Since 2022 (last 5 years) | 62 |
| Since 2017 (last 10 years) | 119 |
| Since 2007 (last 20 years) | 316 |
Descriptor
Source
Author
| Goldsborough, Reid | 6 |
| Villano, Matt | 5 |
| Descy, Don E. | 4 |
| Hope, Andrew | 4 |
| Panettieri, Joseph C. | 3 |
| Almes, Guy T. | 2 |
| Anderson, Jimmeka | 2 |
| Bennett, Cedric | 2 |
| Benson, Allen C. | 2 |
| Botterman, Maarten | 2 |
| Breeding, Marshall | 2 |
| More ▼ | |
Publication Type
Education Level
Audience
| Administrators | 14 |
| Teachers | 14 |
| Practitioners | 13 |
| Parents | 7 |
| Media Staff | 6 |
| Policymakers | 3 |
| Students | 3 |
| Counselors | 1 |
Location
| United Kingdom | 13 |
| Turkey | 12 |
| United States | 10 |
| Australia | 9 |
| California | 8 |
| Texas | 8 |
| Canada | 7 |
| Spain | 7 |
| India | 6 |
| Massachusetts | 6 |
| Ohio | 6 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Suess, Jack; Morooney, Kevin – EDUCAUSE Review, 2009
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
Descriptors: Higher Education, Internet, Computer Software, Computer Security
de Abreu, Belinha S. – Peter Lang New York, 2011
This book, a resource for educators, uses the theme of media literacy as a lens through which to view and discuss social networking and Web 2.0 environments. There is ongoing and positive research on the participatory culture created by youth who are heavily involved in the new digital technologies, yet schools tend to avoid these mediums for fear…
Descriptors: Media Literacy, Internet, Social Networks, Electronic Publishing
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Sturgeon, Julie – T.H.E. Journal, 2008
Acting on information from students who reported seeing a classmate looking at inappropriate material on a school computer, school officials used forensics software to plunge the depths of the PC's hard drive, searching for evidence of improper activity. Images were found in a deleted Internet Explorer cache as well as deleted file space.…
Descriptors: Computer Software, Computers, Internet, School Safety
Baule, Steven M.; Kriha, Darcy L. – Library Media Connection, 2008
In the potential shadow of a "Bong Hits for Jesus" banner, complicated student speech and discipline issues arise almost daily on the Internet. Whether it is a mock MySpace page set up to make fun of a teacher or a direct threat to an assistant principal, it is often unclear exactly where school ground discipline ends and student free speech…
Descriptors: Campuses, Discipline, Freedom of Speech, Internet
Villano, Matt – T.H.E. Journal, 2008
The Children's Internet Protection Act (CIPA) requires any school or library receiving funding from the federal E-Rate program to deploy web filtering technology to prevent users from viewing objectionable material while they are using the institution's computers. However, opponents of web filtering legislation question whether or not mandated…
Descriptors: Internet, Web Sites, Computer Security, Computer Uses in Education
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Jung, I. Y.; Yeom, H. Y. – IEEE Transactions on Education, 2009
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
Descriptors: Virtual Classrooms, Internet, Computer Security, Computer Uses in Education
Sheard, Reed – EDUCAUSE Quarterly, 2010
When the author was brought on as CIO of Westmont College in October 2008, the president, Board of Trustees, and campus environment made it clear that technology needed a major overhaul to meet the college's growing requirements. Also, these changes needed to happen without significantly increasing the IT budget or staff. Marketing Charts…
Descriptors: Problem Solving, Computer Mediated Communication, Educational Finance, Innovation
Titus, Aaron – Chronicle of Higher Education, 2008
This article describes five organizational policies and behavior that put personal information in jeopardy. These are: (1) Inadequate security for old data; (2) Shadow systems and unregulated servers; (3) Unsophisticated privacy policies; (4) Improper use of Social Security numbers; and (5) Unsanitized old hard drives. Although the academic…
Descriptors: Privacy, Educational Environment, Internet, Data
Goldsborough, Reid – Black Issues in Higher Education, 2004
"Cookies" are tiny Web browser helpers and are an example of how the useful can get tossed in with the dangerous through the near hysteria brought about by the real threats of computer viruses, hacking, spyware, spam and phishing. This article briefly discusses antispyware legislation by Congress and the pros and cons of past and future…
Descriptors: Computer Security, Computers, Fear, Computer Security
Moller, Klaus – Campus-Wide Information Systems, 2007
Purpose: Grid computing has often been heralded as the next logical step after the worldwide web. Users of grids can access dynamic resources such as computer storage and use the computing resources of computers under the umbrella of a virtual organisation. Although grid computing is often compared to the worldwide web, it is vastly more complex…
Descriptors: Computer Security, Computer Networks, Foreign Countries, Internet
Pierce, Steven Russell – ProQuest LLC, 2009
Information technology (IT) certifiers evaluate risk and develop mitigations ensuring IT infrastructures remain protected within acceptable levels of operation, which if not properly maintained can potentially result in loss of life within Department of Defense (DoD) and federal environments. This qualitative phenomenological exploratory study…
Descriptors: Data Analysis, Certification, Internet, Information Technology
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy

Peer reviewed
Direct link
