Publication Date
In 2025 | 25 |
Since 2024 | 163 |
Since 2021 (last 5 years) | 423 |
Since 2016 (last 10 years) | 647 |
Since 2006 (last 20 years) | 1225 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Gosmire, Doreen; Grady, Marilyn L. – Principal Leadership, 2007
Technology expenditures and usage in schools have risen by nearly 300 percent during the last three decades. Few principals claim to be technology experts, but most aspire to design a map that leads their schools to success with educational technology. The key to success on the journey is not to know everything, but to ask the right questions.…
Descriptors: Principals, Educational Technology, Technology Integration, Educational Trends
Tynes, Brendesha M. – Journal of Adolescent Research, 2007
Many Internet safety and parenting experts suggest that parents prohibit their teens from social networking sites and other online spaces where predators may lurk. But we may do adolescents a disservice when we curtail their participation in these spaces, because the educational and psychosocial benefits of this type of communication can far…
Descriptors: Safety, Internet, Adolescents, Social Networks
Harrison, Warren – Journal on Educational Resources in Computing, 2006
The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…
Descriptors: Computer Security, Computer System Design, Evidence, Crime
Dewey, Barbara I.; DeBlois, Peter B. – EDUCAUSE Review, 2006
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2005 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Information Technology, Surveys, Annual Reports, Strategic Planning
Olagunju, Amos O. – Online Submission, 2008
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…
Descriptors: Safety, Parent Participation, Parent Role, Parent School Relationship
Tabor, Sharon W. – Quarterly Review of Distance Education, 2007
Distance education has become an expectation with students who have grown up with technology as well as nontraditional and working students. Most universities now offer a wide range of online courses and degree programs to meet these needs. Online delivery of technology courses, however, has been problematic when the course includes very complex…
Descriptors: Distance Education, Online Courses, Computer Security, Information Science Education
Campus Technology, 2007
This article profiles the winners of this year's competition for outstanding technology innovation on US college and university campuses. The winners are: (1) Rice University, Texas (virtualized networks); (2) Drexel University, Pennsylvania (rich media); (3) Harvard Business School, Massachusetts (network management); (4) Louisiana State…
Descriptors: Educational Innovation, Awards, Emergency Programs, Higher Education
Rawlinson, David R.; Lupton, Robert A. – Journal of Education for Business, 2007
Students' attitudes and perceptions regarding the use of unlicensed software are important to educators and businesses. Students have a proven propensity to pirate software and other intellectual property. By understanding how attitudes and perceptions toward software piracy differ among university students in a cross-national context, educators…
Descriptors: Student Attitudes, Computer Software, Information Technology, Foreign Countries
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Hogle, Jan G. – 1996
This document is a printed copy of the Web site written to educate Internet users about potential risks associated with communication over the Internet, and to suggest precautions to reduce those risks. An Introduction highlights why users should care about privacy on the Internet, activities that can reveal personal information to others, and…
Descriptors: Computer Mediated Communication, Computer Security, Discussion Groups, Electronic Mail
Shermis, Mark D.; Averitt, Jason – 2001
The purpose of this paper is to enumerate a series of security steps that might be taken by those researchers or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations here…
Descriptors: Computer Assisted Testing, Computer Security, Performance Based Assessment, Testing Problems
US Department of Homeland Security, 2005
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
Descriptors: Public Schools, Computer Security, High Schools, Bullying
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Educom Review, 1996
Presents the first part of an interview with Vinton Cerf, senior vice president of data architecture for MCI Engineering, on the growth and future of the Internet. Topics include: pornography; commercialization; security; government role; content found on the Internet; and convergence of technologies. (DGM)
Descriptors: Business, Computer Security, Futures (of Society), Government Role
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration