Publication Date
| In 2026 | 0 |
| Since 2025 | 15 |
| Since 2022 (last 5 years) | 94 |
| Since 2017 (last 10 years) | 214 |
| Since 2007 (last 20 years) | 751 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks
Trotter, Andrew – Education Week, 2006
This article deals with federal E-rate program's support of school leaders' Blackberry habit. The Federal Communications Commission (FCC) has cleared the way to allow money from the $2.25 billion program of subsidies for school technology to apply to e-mail service for mobile, wireless devices, such as the BlackBerry, which are increasingly…
Descriptors: Internet, Electronic Mail, Telecommunications, Computer Networks
Hedberg, John G.; Brudvik, Ole C. – Theory Into Practice, 2008
Technology-dependent teaching strategies can exploit the currently underused capacities of media-rich Web 2.0 technology to enable student engagement and support higher order thinking. In particular, Web 2.0 technologies support learners' opportunities to coconstruct ideas/knowledge and ways in which they can add their own interpretations in to…
Descriptors: Teaching Methods, Internet, Computer Software, Computer Mediated Communication
Awidi, Isaiah T. – EDUCAUSE Quarterly, 2008
While technology has enabled online education in many countries, the same cannot be said for African public universities. Universities in Ghana have made some progress in building networking infrastructure and acquiring computers, but integrating technology into the teaching and learning process has been a challenge. Instructional delivery remains…
Descriptors: Higher Education, Universities, Distance Education, Foreign Countries
Delialioglu, Omer; Oncu, Semiral; Cakir, Hasan – Hacettepe University Journal of Education, 2008
There has been a rapid increase in the number of technology certificate programs offered around the world in the last decade. While designing, developing, and implementing these programs little or no consideration is given to geographical, cultural and developmental differences between different regions of the world. This study investigates the…
Descriptors: Educational Technology, Academic Achievement, Educational Environment, Surveys
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Martin, Stewart; Vallance, Michael – Computers & Education, 2008
This paper summarises the outcomes of research that recorded and interpreted change in pre-service teachers' pedagogical beliefs when immersed in unique synchronous networked collaboration. The pre-service teachers were involved in the design and implementation of synchronous networked tasks, supported by the theoretical and pragmatic application…
Descriptors: Constructivism (Learning), Technology Integration, Educational Technology, Teacher Attitudes
Alberta Advanced Education and Technology, 2009
The graduate of the Communication Technician apprenticeship program is a certified journeyperson who will be able to: (1) supervise, train and coach apprentices; (2) use a thorough knowledge of electrical and electronic theory and its application to communication and associated equipment used in the telecommunication industry; (3) understand…
Descriptors: Foreign Countries, Paraprofessional Personnel, Apprenticeships, Telecommunications
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
Kemppainen, Jyri; Tedre, Matti; Sutinen, Erkki – Journal of Information Technology Education: Research, 2012
Information technology (IT) professionals face markedly different kinds of challenges in developing countries from the ones in developed countries. Based on the research literature and our fourteen years of fieldwork in Iringa, Tanzania, we have identified eight groups of technical characteristics of IT work that significantly affect the work of…
Descriptors: Foreign Countries, Developing Nations, Engineering Education, Work Environment
Liu, Yipeng – ProQuest LLC, 2009
Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…
Descriptors: Information Technology, Competition, Computer Software, Cost Effectiveness
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2009
Twitter (www.twitter.com) has become kind of a popular culture punch line. It's often used as a shorthand to represent how self-obsessed and self-involved the American culture has become, and while Twitter does lend itself to a kind of needless sharing, it also has some potentially useful features. Twitter is a microblogging service that allows…
Descriptors: Feedback (Response), Research Tools, Popular Culture, Outreach Programs
Valenza, Joyce Kasman; Johnson, Doug – School Library Journal, 2009
The library, as we once knew it, may no longer be relevant. And, yet, this is undoubtedly the most exciting time in history to be a librarian. The future of the school library as a relevant and viable institution is largely dependent on librarians and how quickly they respond to change. They worry about their field and their practice. They worry…
Descriptors: Intellectual Freedom, Intellectual Property, Computers, School Libraries

Direct link
Peer reviewed
