Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Spoor, Dana L. – American School & University, 1996
School districts are integrating security and life-safety systems into school buildings to protect students and property. This proactive approach includes sprinkler systems, fire alarms, and security systems that monitor door movement. Some school districts that are incorporating the latest life-safety technology are in Missouri, Ohio, California,…
Descriptors: Alarm Systems, Building Innovation, Built Environment, Computer Security
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology
EDUTECH Report, 1993
This newsletter examines education technology issues of concern to school faculty and administrators. Regular features in each issue include educational technology news, a book review, and a question and answer column. The cover articles during this volume year are: "Data Access Issues: Security Vs. Openness"; "Creation of an…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Decision Making
Stubbs, Keith M. – 1996
This document defines the specific standards and general guidelines which the U.S. Department of Education (ED) will use to make information available on the World Wide Web (WWW). The purpose of providing such guidance is to ensure high quality and consistent content, organization, and presentation of information on ED WWW servers, in order to…
Descriptors: Access to Information, Computer Security, Computer System Design, Disabilities
Hinga, Sophia W.; Chen, Linlin Irene – 1998
With the assistance of learning technology consultants in the Technology Teaching and Learning Center (TTLC) at the University of Houston-Downtown (Texas), professors have shifted their paradigms and are taking the leap to use more high-risk World Wide Web technologies in their courses. One that has become a hallmark is delivering exams via the…
Descriptors: Authoring Aids (Programming), Computer Assisted Testing, Computer Managed Instruction, Computer Security
Odabasi, H. Ferhan – Turkish Online Journal of Educational Technology - TOJET, 2005
Children's effective use of Internet relies heavily on the factors surrounding them, thus parents' views and attitudes are crucial for elementary children's productive use of Internet. Besides, parental awareness on Internet helps parents to reflect to the related issues of Internet. This study tries to reveal the elementary school children's…
Descriptors: Internet, Parent Attitudes, Mass Media Use, Elementary School Students
American Association of Community Colleges, Washington, DC. – 2002
The education and training of the cybersecurity workforce is an essential element in protecting the nation's computer and information systems. On June 26-28, 2002, the National Science Foundation supported a cybersecurity education workshop hosted by the American Association of Community Colleges. The goals of the workshop were to map out the role…
Descriptors: Community Colleges, Computer Security, Computers, Crime
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This January 16, 2004 issue of "Chronicle for Higher Education" contains the following articles: (1) "Gymnasium, Ecology Lab, Sentinel" (Selingo, Jeffrey); (2) "Fewer…
Descriptors: Ecology, Higher Education, Foreign Countries, College Faculty
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Internal Revenue Service (Dept. of Treasury), Washington, DC. – 1994
This packet contains a textbook, an instructor's guide, and a student workbook for a course on conducting financial investigations to detect and solve crimes. The topics covered in the 11 chapters of the textbook and the ancillaries are the following: (1) why financial investigation?; (2) laws related to financial crimes; (3) evidence; (4) sources…
Descriptors: Banking, Classroom Techniques, Computer Security, Course Content
CAUSE, Boulder, CO. – 1996
Eight papers are presented from the 1995 CAUSE conference track on client/server issues faced by managers of information technology at colleges and universities. The papers include: (1) "The Realities of Client/Server Development and Implementation" (Mary Ann Carr and Alan Hartwig), which examines Carnegie Mellon University's transition…
Descriptors: Colleges, Computer Networks, Computer Security, Computer System Design
Northwest Educational Technology Consortium, Portland, OR. – 1996
This videotape, a two-hour follow-up to the earlier "Get Wired: Designing Your School Network" teleconference, presents issues in implementing and maintaining a network. Program segments on network management, training and professional development, security and access, and growing the network are addressed by a panel of educators from…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design
White, Rebecca Leigh, Ed. – Alabama Department of Education, 2005
"Alabama Education News" is published monthly except for June, July, and December by the Alabama Department of Education. This publication, authorized by Section 16-2-4 of the "Code of Alabama", as recompiled in 1975, is a public service of the Alabama Department of Education designed to inform citizens and educators about…
Descriptors: Educational Objectives, Parent Participation, Parent School Relationship, Public Education
Belon, Barbara; Wright, Marie – 2002
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
Descriptors: College Curriculum, College Instruction, Community Colleges, Computer Science
Shelly, Gary B.; Cashman, Thomas J.; Gunter, Randolph E.; Gunter, Glenda A. – 1999
Intended for use in an introductory computer course for educators, this textbook contains the following chapters: (1) "Introduction to Using Computers in Education"; (2) "Communications, Networks, the Internet, and the World Wide Web"; (3) "Software Applications for Education,"; (4) "Hardware Applications for…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Educational Technology