NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 901 to 915 of 1,589 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Stauffer, Sterling; Heath, Melissa Allen; Coyne, Sarah Marie; Ferrin, Scott – Psychology in the Schools, 2012
Recent meta-analyses indicate that bully prevention programs produce minimal change in student behavior. This study examined 66 high school teachers' perceptions regarding the effect of cyberbullying on students, which intervening strategies teachers would use when dealing with cyberbullying, and which prevention strategies would assist in…
Descriptors: Prevention, Intervention, Student Behavior, Fidelity
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lawler, James P. – Information Systems Education Journal, 2011
The cloud continues to be a developing area of information systems. Evangelistic literature in the practitioner field indicates benefit for business firms but disruption for technology departments of the firms. Though the cloud currently is immature in methodology, this study defines a model program by which computer science and information…
Descriptors: Computer Science Education, Information Science Education, Information Systems, Computer Software
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Sharp, Linda – School Business Affairs, 2011
School system leaders never know when disaster may strike. Having a plan in place to protect vital data and systems is crucial. School system leaders need to be actively involved in crisis preparedness, planned response, and recovery to ensure student and staff safety and to make certain that all important operations, services, processes, and…
Descriptors: School Security, Crisis Management, Emergency Programs, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Doerr-Stevens, Candance; Beach, Richard; Boeser, Elizabeth – English Journal, 2011
This article discusses how students use online role-play to collaborate and change real school policy. Playing different characters in an online role-play, students explore controversial aspects of Internet filtering and adopt a plan to change their school's policy. Through engaging in collaborative argumentation during their role-play, students…
Descriptors: Online Courses, Peer Groups, School Policy, Role Playing
McDonald, Aleecia M. – ProQuest LLC, 2010
As more people seek the benefits of going online, more people are exposed to privacy risks from their time online. With a largely unregulated Internet, self-determination about privacy risks must be feasible for people from all walks of life. Yet in many cases decisions are either not obvious or not accessible. As one example, privacy policies are…
Descriptors: Reading Comprehension, Economic Research, Risk, Internet
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Cherry, John D. – ProQuest LLC, 2010
According to the Department of Defense (DoD), a review of information assurance (IA) in the United States Air Force (USAF) in 2009, cyber security is jeopardized because of information loss. This situation has occurred in large part because of less than optimal training practices or adherence to training protocols. The purpose of this study was…
Descriptors: Quasiexperimental Design, Social Behavior, Program Effectiveness, Social Change
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McNabb, Lori – Continuing Higher Education Review, 2010
This article discusses the implementation this year of the Department of Education's Higher Education Opportunity Act of 2008 (HEOA), which requires accreditors to ensure that an institution that offers distance or correspondence education has a process in place to establish that a student who registers in a course or program is also the same…
Descriptors: Distance Education, Higher Education, College Students, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Custer, William L. – New Directions for Institutional Research, 2010
Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…
Descriptors: Institutional Research, Databases, School Security, Computer Security
Willard, Nancy – Corwin, 2012
Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…
Descriptors: Child Safety, Computers, Internet, Secondary School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Pusey, Portia; Sadera, William A. – Journal of Digital Learning in Teacher Education, 2012
In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related and Internet-capable technologies into instructional settings to improve student learning. Many presume that preservice teachers have the knowledge to competently model and teach issues of safety when working with these devices as…
Descriptors: Preservice Teacher Education, Preservice Teachers, Standards, Laws
Pages: 1  |  ...  |  57  |  58  |  59  |  60  |  61  |  62  |  63  |  64  |  65  |  ...  |  106