Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
White, Rebecca Leigh, Ed. – Alabama Department of Education, 2005
"Alabama Education News" is published monthly except for June, July, and December by the Alabama Department of Education. This publication, authorized by Section 16-2-4 of the "Code of Alabama", as recompiled in 1975, is a public service of the Alabama Department of Education designed to inform citizens and educators about…
Descriptors: Educational Objectives, Parent Participation, Parent School Relationship, Public Education
Belon, Barbara; Wright, Marie – 2002
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
Descriptors: College Curriculum, College Instruction, Community Colleges, Computer Science
Shelly, Gary B.; Cashman, Thomas J.; Gunter, Randolph E.; Gunter, Glenda A. – 1999
Intended for use in an introductory computer course for educators, this textbook contains the following chapters: (1) "Introduction to Using Computers in Education"; (2) "Communications, Networks, the Internet, and the World Wide Web"; (3) "Software Applications for Education,"; (4) "Hardware Applications for…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Educational Technology
Peer reviewedTrolley, Jacqueline H.; Cody, Julianne W. – Science & Technology Libraries, 1997
The Institute for Scientific Information Electronic Library Project (ELP) is a result of user demand for electronic access to scientific journal literature as well as to those journals themselves. This article describes the ELP; examines ELP's partnerships with technological organizations, publishers, librarians, and users; and discusses two core…
Descriptors: Access to Information, Computer Security, Cooperative Programs, Economic Factors
Karpisek, Marian; And Others – Media & Methods, 1995
Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…
Descriptors: Computer Networks, Computer Security, Educational Media, Elementary Secondary Education
Peer reviewedCombs, Joseph, Jr. – Library Software Review, 1995
Reviews the Total Library Computerization program, which can be used to manage small to midsized libraries. Discusses costs; operating system requirements; security features; user-interface styles; and system modules including online cataloging, circulation, serials control, acquisitions, authorities control, and interlibrary loan. (Author/JMV)
Descriptors: Authority Control (Information), Cataloging, Computer Interfaces, Computer Security
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks
Bergstrom, Laura; Grahn, Kaj J.; Karlstrom, Krister; Pulkkis, Goran; Astrom, Peik – Journal of Information Technology Education, 2004
This article presents a virtual course with the topic network security. The course has been produced by Arcada Polytechnic as a part of the production team Computer Networks, Telecommunication and Telecommunication Systems in the Finnish Virtual Polytechnic. The article begins with an introduction to the evolution of the information security…
Descriptors: Computer Security, Educational Technology, Telecommunications, Computer Networks
Hope, Andrew – British Educational Research Journal, 2006
Internet access has recently been introduced into over 30,000 schools in the UK. While web provision has been heralded by some as an educational panacea, it is also recognised that there are dangers inherent in school Internet use. Adopting the cultural risk perspective, drawing upon a social-cultural analysis of Internet regulation and utilising…
Descriptors: Foreign Countries, Internet, At Risk Persons, Pornography
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Krunic, Tanja; Ruzic-Dimitrijevic, Ljiljana; Petrovic, Branka; Farkas, Robert – Journal of Information Technology Education, 2006
The Advanced Technical School from Novi Sad set up a completely new study group for web design in 2004. The main goals of the paper are to explain the steps that were taken in starting this group, and to present the educational program based on our own research through the organization of the group and course descriptions. Since there is a…
Descriptors: Investigations, Prior Learning, Course Descriptions, Internet
Lorenzen, Elizabeth A., Ed. – 1996
This book contains 11 papers examining career planning and job searching in the information age. The following papers are included: "The Librarian's Role in the Job Search of the Future: Issues and Ethics in the Electronic Environment" (Elizabeth A. Lorenzen); "The Internet as Career, Job, and Employment Resource: Transition, Assimilation,…
Descriptors: Career Education, Career Planning, Computer Security, Ethics
Ren, Zhanying; Liu, Shijie – Online Submission, 2005
According to the requirement of modern teaching theory and technology, based on software engineering, database theory, the technique of net information security and system integration, a net testing system on local network was designed and realized. The system benefits for dividing of testing & teaching and settles the problems of random…
Descriptors: Educational Technology, Databases, Information Technology, Computer Networks
Shaw, Beth Hansen – 1999
This document reports results of an online survey that examined practices and procedures in the management of electronic resources in 65 academic library reference departments. Responses are related to: (1) student population; (2) library use by community people; (3) number of public access workstations, workstations with World Wide Web access,…
Descriptors: Academic Libraries, Access to Information, Computer Security, Databases

Direct link
