NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 976 to 990 of 1,629 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
American Journal of Distance Education, 2010
David Foster is the founder of Kryterion, an Internet test administration company, and currently serves there as chief scientist and executive vice president. He is the author of numerous articles for industry trade journals and textbooks and sits on the Council for the International Test Commission. In this interview, Foster talks about his…
Descriptors: Test Construction, High Stakes Tests, Educational Technology, Interviews
Price, Alan – ProQuest LLC, 2011
Today, advances in wireless sensor networks are making it possible to capture large amounts of information about a person and their interaction within their home environment. However, what is missing is how to ensure the security of the collected data and its use to alter human behavior for positive benefit. In this research, exploration was…
Descriptors: Physical Activities, Measurement Techniques, Physical Activity Level, Behavior Modification
Peer reviewed Peer reviewed
Direct linkDirect link
Anastasiades, Panagiotes S.; Vitalaki, Elena – Educational Technology & Society, 2011
The introduction of the Internet at schools has raised new pedagogical challenges facing educators trying to ensure children's awareness of the possible dangers when surfing the Web. This article aims to investigate how teachers evaluate the possible dangers that students might face when surfing the Net for various educational or interpersonal…
Descriptors: Foreign Countries, Internet, Teacher Role, Elementary Education
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Massengale, Ricky L., Sr. – ProQuest LLC, 2009
With the ability of modern system developers to develop intelligent programs that allows machines to learn, modify and evolve themselves, current trends of reactionary methods to detect and eradicate malicious software code from infected machines is proving to be too costly. Addressing malicious software after an attack is the current methodology…
Descriptors: Computer Software, Computer System Design, Computer Security, Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Endicott-Popovsky, Barbara – Teacher Librarian, 2009
Without specific education in online safety and security issues, putting any limitations on access could seem counter to what a librarian is trained to do. At a cybersecurity workshop sponsored by Washington Library Media Association (WLMA) last October, an informal show of hands from attending teacher-librarians uncovered a range of motivations…
Descriptors: Safety, Internet, School Policy, Librarians
Dessoff, Alan – Education Digest: Essential Readings Condensed for Quick Review, 2010
Until this year, the Oregon Department of Education ran a central portal of thousands of learning resources that required all teachers and students to have an email address as authentication for security purposes. Because many districts didn't offer student email, the learning materials were not available to everyone. In April, Oregon became the…
Descriptors: Internet, State Departments of Education, Electronic Mail, Systems Approach
Roberts, Kevin J. – Exceptional Parent, 2010
Parents need to be aware of the dangers and the opportunities the cyber world offers. Video games are being used in the classroom. Commerce is increasingly taking place online and computers are indispensable in the workplace. A cyber-oriented child possesses some great advantages. The author urges parents to become experts in the cyber world so…
Descriptors: Video Games, Internet, Parents, Teaching Methods
Consortium for School Networking (NJ1), 2011
Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…
Descriptors: Safety, Laws, School Districts, Internet
Clarke, Alan – Routledge, Taylor & Francis Group, 2011
The use of technology within the lifelong learning sector brings many benefits to learners, teachers and managers. Aimed at trainee and practising teachers, this book contains clear, practical guidance on how to use technology and e-learning effectively to enhance all aspects of teaching and learning in the post-compulsory sector. Alan Clarke…
Descriptors: Electronic Learning, Portfolios (Background Materials), Electronic Publishing, Discussion Groups
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Grossklags, Jens – ProQuest LLC, 2009
Computer users express a strong desire to prevent attacks, and to reduce the losses from computer and information security breaches. However, despite the widespread availability of various technologies, actual investments in security remain highly variable across the Internet population. As a result, attacks such as distributed denial-of-service…
Descriptors: Economic Research, Probability, Internet, Computer Security
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Villano, Matt – Campus Technology, 2009
Academic technologists at Lynn University (Florida) learned the hard way just how important a disaster recovery plan can be. Back in 2005, when Hurricane Wilma walloped the region with driving rain and 120 mile-per-hour winds, the storm debilitated Lynn's IT department, causing damage and flooding that thwarted the campus network for nearly two…
Descriptors: Emergency Programs, Educational Technology, Information Technology, Internet
Grush, Mary – Campus Technology, 2009
As colleges and universities rely more heavily on software as a service (SaaS), they're putting more critical data in the cloud. What are the security issues, and how are cloud providers responding? "Campus Technology" ("CT") went to three higher ed SaaS vendors--Google, IBM, and TopSchool--and asked them to share their thoughts about the state of…
Descriptors: Higher Education, Computer Software, Educational Technology, Computer Uses in Education
Pages: 1  |  ...  |  62  |  63  |  64  |  65  |  66  |  67  |  68  |  69  |  70  |  ...  |  109