Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Greitzer, Frank L.; Kuchar, Olga Anna; Huston, Kristy – Journal on Educational Resources in Computing, 2007
Serious games use entertainment principles, creativity, and technology to meet government or corporate training objectives, but these principles alone will not guarantee that the intended learning will occur. To be effective, serious games must incorporate sound cognitive, learning, and pedagogical principles into their design and structure. In…
Descriptors: Training Objectives, Educational Technology, Educational Principles, Design Requirements
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Cossey, David – Association of Small Computer Users in Education (ASCUE), 2005
Small colleges have unique challenges with respect to their information technology environments. It is easy to forget sometimes that small colleges are not simply small big colleges, and that IT needs to be considered in a particular way, especially because of its associated costs. For one thing, the senior administration at a small college may be…
Descriptors: Information Technology, Small Colleges, Telecommunications, Computers

Cardinali, Richard – Journal of Educational Media and Library Sciences, 1995
Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)
Descriptors: Computer Security, Crime Prevention, Databases, Information Systems
Field, Judy – Computers in Libraries, 1998
Reviews the Internet and intranets, private communications networks within organizations. Examines extranets (organization's intranet offering password-protected external customer and supplier access to selected portions of its intranet) highlighting the viewpoint of librarians. Discusses extranet issues (security, access, user satisfaction),…
Descriptors: Access to Information, Computer Security, Computer Software Development, Corporations

Jayawardhena, Chanaka; Foley, Paul – Internet Research, 2000
Discussion of changes in the banking industry focuses on an analysis of 12 Internet banking operations in the United Kingdom. Topics include delivery strategies; customer demand and requirements; and an evaluation of banking Web sites that considers speed, content and design, navigation, interactivity, and security. (LRW)
Descriptors: Banking, Computer Security, Content Analysis, Delivery Systems
Patterson, Kristin – American School Board Journal, 1996
Property theft at schools is a problem districts are having to confront. Deterrents include inventory checks and etching equipment with inventory control numbers. In Washington, D.C., officials are installing high-security equipment such as closed-circuit television, fiber-optics lines to secure computers, and motion detectors. (MLF)
Descriptors: Alarm Systems, Computer Security, Cost Effectiveness, Crime Prevention

Khosrow-Pour, Mehdi; Herman, Nancy – Electronic Library, 2001
Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…
Descriptors: Computer Security, Delphi Technique, Electronic Mail, International Law
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security
Johnson, Doug – Library Media Connection, 2005
School tech services may use firewall filters to protect computer users from computer virus programs that spread as e-mail attachments, hidden in programs downloaded from Web sites, and as macros in word processing and other documents. Backups, the copy of self-created documents and grade book data should be stored in online storage space or DVD…
Descriptors: Word Processing, Electronic Mail, Information Technology, Computer Security
von Munkwitz-Smith, Jeff; West, Ann – College and University, 2004
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Descriptors: Access to Information, Identification, Information Technology, Educational Policy
Stella, Antony; Gnanam, A. – Higher Education: The International Journal of Higher Education and Educational Planning, 2004
Integration of technology in all forms of education has narrowed down the gap between the on- and off-campus students and has resulted in the use of the more broad-based term "distributed learning". Consequently, distance learning is seen as a subset of distributed learning, focusing on students who may be separated in time and space from their…
Descriptors: Quality Control, Distance Education, Technology Integration, Educational Technology
Ferguson, Aaron J. – EDUCAUSE Quarterly, 2005
The United States Military Academy (USMA) at West Point had a problem with some cadets clicking on suspicious attachments and embedded links, significantly affecting network performance and resource availability. West Point information technology leadership needed a way to increase e-mail security awareness in hopes of maintaining a strong…
Descriptors: Information Technology, Educational Technology, Internet, Electronic Mail
Kafai, Yasmin B.; Nixon, Althea Scott; Burnam, Bruce – Journal of Technology and Teacher Education, 2007
With increased computer technology use in schools, preservice teachers must be prepared to deal with ethical issues involved in a range of computer uses, such as students plagiarizing from the Internet or accessing adults-only web sites. We investigated preservice teachers' judgments regarding several scenarios of student uses of the computer and…
Descriptors: Internet, Preservice Teachers, Ethics, Preservice Teacher Education
Enyeart, Mike; Staman, E. Michael; Valdes, Jose J., Jr. – EDUCAUSE Review, 2007
The concept of convergence has evolved significantly during recent years. Today, "convergence" refers to the integration of the communications and computing resources and services that seamlessly traverse multiple infrastructures and deliver content to multiple platforms or appliances. Convergence is real. Those in higher education, and especially…
Descriptors: Educational Opportunities, Higher Education, Educational Trends, Surveys