Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Cunningham, Alisa F.; Milam, John – National Center for Education Statistics, 2005
This report examines the feasibility of implementing a student unit record system to replace the student-related components that currently are based on aggregate institution-level data collected as part of the Integrated Postsecondary Education Data System (IPEDS). The feasibility study was initiated by the National Center for Education Statistics…
Descriptors: Feasibility Studies, Student Records, Evaluation Methods, Technology Integration
Anderson, Laura Challman; Lotspiech, Jeffrey B. – Bulletin of the American Society for Information Science, 1995
Discusses collaborative efforts by the Institute for Scientific Information (ISI) and the IBM Digital Library Group in creating techniques to ensure information integrity, journal article authenticity, user confidentiality, management of copyright, and general security in electronic libraries. Also describes the rights management and security…
Descriptors: Access to Information, Computer Security, Computer System Design, Confidentiality

Duggan, Brian – TechTrends, 1994
Explores design considerations for a functional microcomputer lab, including ergonomics and furnishings; access for the disabled; the use of other media; hardware security; and software security, including virus protection. A summary paragraph comments on the role of planning and forecasting. A bibliography of eight titles for further reading is…
Descriptors: Accessibility (for Disabled), Audio Equipment, Computer Centers, Computer Security

Dawes, Sharon S.; Pardo, Theresa A.; DiCaterino, Ann – Journal of the American Society for Information Science, 1999
Two Internet testbeds conducted at the New York State Center for Technology in Government (CTG) identified five threshold factors that shape a government agency's ability to initiate Web-based services: technical infrastructure, user capabilities, information content, cost, and security. Six kinds of benefits of the Web to deliver government…
Descriptors: Computer Security, Costs, Federal Government, Federal Programs

Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security
Littman, Marlyn Kemper – Journal of Online Learning, 1998
Explores capabilities of extranets (collaborative information networks between partner institutions) from the perspective of the school and university environment. Introduces distinctive features. Presents strategies and techniques for facilitating the extranet design and implementation process and delineates tactics for safeguarding extranets…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Furnell, Steven; Evans, Mike; Bailey, Paul – Quarterly Review of Distance Education, 2000
Discusses benefits of online distance learning and considers some of the barriers that need to be addressed for successful implementation. Topics include quality compared to traditional face-to-face methods; academic workloads; self-pacing issues; the lecturer's role; lack of standards; security concerns; and the need for strategic planning. (LRW)
Descriptors: Computer Assisted Instruction, Computer Security, Conventional Instruction, Distance Education
Spicer, Donald Z.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2004
This year marks the fifth annual EDUCAUSE Current Issues Survey to identify what campus information technology leaders see as their most critical IT challenges. Thirty-five percent (571) of the 1,638 EDUCAUSE primary member representatives who were asked to participate responded to an e-mail invitation to complete the Web-based survey in December…
Descriptors: Information Technology, Human Resources, Leadership, Higher Education
Beasley, William; Dobda, Kathyanne W.; Wang, Lih-Ching Chen – International Journal of Instructional Media, 2005
In recent years laptop computers have become increasingly popular in educational settings; wireless connectivity is a more recent development which is only now being fully explored, and which has led to the creation of the "wireless laptop lab." In this article, the authors share some of the experiences and concerns that they have encountered…
Descriptors: Telecommunications, Computer Interfaces, Computer Uses in Education, Educational Technology
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Direct Marketing Association, Washington, DC. – 1997
The ability to meet people, visit places around the globe, and make purchases online has added a new dimension to teaching children about the opportunities and accompanying risks that exist in everyday life. The Direct Marketing Association has created this guide to information use, behavior, and privacy on the Internet to help parents supervise…
Descriptors: Computer Attitudes, Computer Security, Electronic Mail, Information Industry
Galbreath, Jeremy, Ed. – Educational Technology, 1997
Examines the "reality behind the hype" surrounding the Internet. Discusses its early development; growth and present state; and key applications, including e-mail, voice/video telephony, integrated messaging, electronic commerce, the World Wide Web, and Web commerce, Intranet, Extranet; education and training; security; ownership; and…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Oriented Programs, Computer Security
Wakabayashi, Ippei – Educom Review, 1997
Discusses social and cultural challenges that Internet technology raises. Highlights include preserving the freedom in cyberspace, the information distribution scheme of the Internet, two-way interactivity, search engines as marketing tools, the insecurity of cyberspace, online safety rules for children, educating children to "walk…
Descriptors: Access to Information, Child Safety, Computer Mediated Communication, Computer Security
Yrchik, John; Cradler, John – ED, Education at a Distance, 1994
Discusses guidelines that were developed to ensure that the National Information Infrastructure provides expanded opportunities for education and training. Topics include access requirements for homes and work places as well as schools; education and training application requirements, including coordination by federal departments and agencies; and…
Descriptors: Access to Computers, Access to Information, Computer Assisted Instruction, Computer Security