Publication Date
In 2025 | 20 |
Since 2024 | 156 |
Since 2021 (last 5 years) | 416 |
Since 2016 (last 10 years) | 640 |
Since 2006 (last 20 years) | 1218 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Akcay, Behiye – Turkish Online Journal of Distance Education, 2008
The purpose of this study is to discuss the ethical issues in education in terms of teachers, students, schools, and software companies. Recent growth of the internet and World Wide Web allows new developments in the way instructors transfer knowledge to their students. Technology is a new tool in education that constantly changes and offers new…
Descriptors: Educational Technology, Internet, Ethics, Computer Security
Seock, Yoo-Kyoung; Norton, Marjorie J. T. – College Student Journal, 2008
The purpose of this study was to examine perceptions of attributes of clothing retailers' Internet websites in relation to previous and intended future purchase from the websites. Survey data from 414 U.S. college students, non-married and aged 18-22 with online clothing shopping experience and favorite clothing websites were used. Five clothing…
Descriptors: College Students, Merchandise Information, Consumer Education, Factor Analysis
Pendegraft, Norman – Journal of Information Systems Education, 2009
An inexpensive device to assist in teaching the main ideas of Public Key encryption and its use in class to illustrate the operation of public key encryption is described. It illustrates that there are two keys, and is particularly useful for illustrating that privacy is achieved by using the public key. Initial data from in class use seem to…
Descriptors: Privacy, Instructional Materials, Business Administration Education, Class Activities
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Englund, Lillian White – Intervention in School and Clinic, 2009
This article discusses the development and use of an on-line portfolio process. It presents a background rationale for the need and effectiveness of a communication tool that supports the use of the portfolio process throughout the education of a child with identified disabilities. The process for developing the individualized Web page is…
Descriptors: Portfolios (Background Materials), Portfolio Assessment, Access to Information, Web Sites
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Sharma, Priya; Xie, Ying – Journal of Asynchronous Learning Networks, 2008
Recently, attempts have been made to use Weblogs and other personal webpublishing technologies to support individual and social reflection in higher education. Weblogs can be highly individual and reflective in nature, and students' experiences and perceptions of the technology and practice are of primary importance in furthering educational use.…
Descriptors: Student Attitudes, Data Analysis, Electronic Publishing, Web Sites
Allison, Debra H.; DeBlois, Peter B. – EDUCAUSE Review, 2008
EDUCAUSE presents the top-ten IT-related issues in terms of strategic importance to the higher education institution, as revealed by the ninth annual EDUCAUSE Current Issues Survey. This year, "Security" moves back to the top of the list. (Contains 20 notes.)
Descriptors: Higher Education, Educational Technology, Computer Uses in Education, Computer Security
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
Just as many people log onto a Web mail site (Gmail, Yahoo, MSN, etc.) to read, write and store their email, there are Web sites out there with word processing, database, and a myriad of other software applications that are not downloadable but used on the site through a Web browser. The user does not have to download the applications to a…
Descriptors: Computer Software, Internet, Online Searching, Web Sites
Schneider, Karen G. – Library Journal, 2007
Over the next several decades, libraries will face the potential loss of all the e-journals, ebooks, electronic theses, local digital collections, and other "e-stuff" curated for the public good. A solution to this problem is LOCKSS ("Lots of Copies Keep Stuff Safe"), a free, open-source digital-preservation software from Stanford University that…
Descriptors: Computer Software, Libraries, Library Networks, Library Services
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration

Liddy, Carrie – Internet Research, 1996
Discusses commercial security on the Internet and explains public key technology as successfully melding the conflicting requirements of openness for practical business applications and isolation and confidentiality for protection of data. Examples of public key value-added products are described, including encryption, digital signature and…
Descriptors: Computer Security, Confidentiality, Internet

Antonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex – Internet Research, 2001
Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…
Descriptors: Computer Security, Computer Software