Publication Date
| In 2026 | 0 |
| Since 2025 | 14 |
| Since 2022 (last 5 years) | 93 |
| Since 2017 (last 10 years) | 213 |
| Since 2007 (last 20 years) | 750 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Peer reviewedBishop, Ann Peterson – Journal of Adolescent & Adult Literacy, 2000
Discusses making community networking a reality for all citizens, noting ways to reduce the digital divide that segments computer use along socioeconomic lines. Lists 4 insights that may help in the design and implementation of community services devoted to computer access and training. Notes a website on community networking, and recent…
Descriptors: Adult Education, Computer Literacy, Computer Mediated Communication, Computer Networks
Peer reviewedDeMauro, Karen – Educause Quarterly, 2001
Describes how Clarion and Edinboro universities bundled their university-related telecommunications services with residence hall services and sought a vendor consortia to install and manage those services. In return for long-term contracts granting the right to sell services, the two consortia invested money to install data networks in the…
Descriptors: College Housing, Computer Networks, Corporate Support, Dormitories
Peer reviewedVan Buren, Cassandra – Journal of Information Ethics, 2001
Discussion of the need for ethical computing strategies and policies at the K-12 level to acculturate computer hackers away from malicious network hacking focuses on a three-year participant observation ethnographic study conducted at the New Technology High School (California) that examined the school's attempts to socialize its hackers to act…
Descriptors: Computer Networks, Computer Uses in Education, Elementary Secondary Education, Ethical Instruction
Peer reviewedPettenati, M. C.; Giuli, D.; Khaled, O. Abou – Journal of Technology and Teacher Education, 2001
Highlights the problems related to the development of professionals in the field of educational technology and defines a series of new professional roles, skills, and competencies needed to respond to the job market demands. Presents a model for professionals involved in the development of network-based courses. (Author/LRW)
Descriptors: Competence, Computer Networks, Educational Technology, Information Technology
Koper, Rob; Tattersall, Colin – British Journal of Educational Technology, 2004
The requirements placed on learning technologies to support lifelong learning differ considerably from those placed on technologies to support particular fragments of a learning lifetime. The time scales involved in lifelong learning, together with its multi-institutional and episodic nature are not reflected in todays mainstream learning…
Descriptors: Adult Education, Information Networks, Computer Networks, Lifelong Learning
Henderson, Dave – Technology & Learning, 2005
Providing quality technical support in K-12 environments can be challenging. Unlike the business world, there is generally a less-than-ideal ratio of technical staff to computers, numerous software titles from dozens of vendors, and of course--a much smaller budget. The Victor Central School District in Victor, New York, has employed a number of…
Descriptors: Computer Uses in Education, Technical Assistance, Elementary Secondary Education, Computer Software
Koivusaari, Ritva – Educational Psychology, 2004
This study analyzed what kind of role sociometric status has in non-real time computer conversations. Computer-supported conversations were investigated by using two local area networks. Participants were 52 9 to 10-year-old schoolchildren selected from three sociometric strata: rejected, average, and popular. Children's preferred friends, school…
Descriptors: Computer Mediated Communication, Gender Differences, Sociometric Techniques, Social Networks
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts
Marginson, Simon – Academe, 2004
In "The Information Age: Economy, Society, and Culture," sociologist Manuel Castells argues that information and communication technologies are associated with a new kind of economy, society, and culture that he calls "informationalism." In this new economic order, knowledge generation, information processing, and symbolic communication--"the…
Descriptors: Information Technology, Information Literacy, Telecommunications, Global Approach
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Cole, David R. – E-Learning, 2007
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process…
Descriptors: Electronic Learning, Terrorism, Internet, Educational Technology
Dobrogowski, W.; Maziewski, A.; Zablotskii, V. – European Journal of Physics, 2007
We describe our experience in building a remote laboratory for teaching magnetic domains. Fulfilling the proposed on-line experiments, students can observe and study magnetization processes that are often difficult to explain with written material. It is proposed that networks of remotely accessible laboratories could be integrated in the Global…
Descriptors: Science Laboratories, Magnets, Scientific Concepts, Science Experiments
Electronic Frontier Foundation, 2006
This paper is intended to help institutions of higher education critically evaluate the principal technological tools and policies being used to enforce copyright on campus networks. It first explores where the goals of copyright holders and universities overlap and where they conflict. It then discusses the pros and cons of the major solutions…
Descriptors: Colleges, Copyrights, Higher Education, Computer Networks
Sendze, Monique – Computers in Libraries, 2006
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Descriptors: Workstations, Public Libraries, Library Services, Library Role
Irving, Karen E. – Science Educator, 2006
The author explores current efforts by educators and policy makers to harness the power of educational technology for both assessment "of learning" and assessment "for learning" in K-12 classrooms. (Contains 1 figure.)
Descriptors: Elementary Secondary Education, Educational Technology, Academic Achievement, Formative Evaluation

Direct link
