Publication Date
In 2025 | 7 |
Since 2024 | 60 |
Since 2021 (last 5 years) | 108 |
Since 2016 (last 10 years) | 231 |
Since 2006 (last 20 years) | 806 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 400 |
Teachers | 174 |
Administrators | 148 |
Policymakers | 90 |
Media Staff | 56 |
Researchers | 54 |
Students | 24 |
Parents | 12 |
Community | 5 |
Counselors | 2 |
Location
Canada | 95 |
United States | 80 |
United Kingdom | 59 |
Australia | 47 |
California | 38 |
Texas | 33 |
Japan | 30 |
New York | 30 |
Florida | 25 |
Pennsylvania | 25 |
Finland | 22 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Does not meet standards | 1 |
Kurubacak, Gulsun – Online Submission, 2007
This paper discusses culture, as a source of conflict than of synergy, how affects the use of new media to build digital citizenships. It also argues that the cultural dimensions of Geert Hofstede, who demonstrates that there are national and regional cultural groupings that affect the behavior of organizations, are very persistent across time.…
Descriptors: Cultural Differences, Intercultural Communication, Instruction, Cultural Awareness
Tunckan, Ergun – Online Submission, 2007
The Open Education Faculty Students Centers have been offering many services to students in Turkey since 1982. Building up bridges between students and faculties, student centers have had technological improvements since 1998 and thereafter quality of services have been increased and services given to students at the student center have been…
Descriptors: Open Education, Open Universities, Foreign Countries, Computer Networks
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Ramaswami, Rama – Campus Technology, 2009
As President Obama said in advance remarks about the American Graduation Initiative: "[T]he hard truth is that some of the jobs that have been lost in the auto industry and elsewhere won't be coming back. And that only underscores the importance of generating new businesses and industries to replace the ones we've lost, and of preparing our…
Descriptors: Business, Education Work Relationship, Job Training, School Business Relationship
Sullivan, Christopher – 1989
Electronic mail is one of several telecommunications technologies that have become potent factors in modern organizational communication. The introduction of such sophisticated microelectronic technology into an organization can have a strong impact on the patterns of communication within that organization. This is the case for the Florida House…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Organizational Communication
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
Finn, Gregory G. – 1987
This report discusses some of the problems and limitations in existing internetwork design for the connection of packet-switching networks of different technologies and presents an algorithm that has been shown to be suitable for internetworks of unbounded size. Using a new form of address and a flat routing mechanism called Cartesian routing,…
Descriptors: Algorithms, Computer Networks, Computer System Design, Models
Parker, Donald C. – Executive Educator, 1987
Describes an electronic mail system used by the Horseheads (New York) Central School Distict's eight schools and central office that saves time and enhances productivity. This software calls up information from the district's computer network and sends it to other users' special files--electronic "mailboxes" set aside for messages and…
Descriptors: Computer Networks, Efficiency, Electronic Mail, Elementary Secondary Education

Huang, Albert H. – Journal of Education for Business, 1997
Online training through computer networks allows the provision of emotional support, privacy, objective performance evaluation, and resource sharing. Trainers must learn new presentation and advising skills. Trainees need to be self-motivated and computer literate. (SK)
Descriptors: Computer Assisted Instruction, Computer Networks, Internet, Online Systems
Olsen, Florence – Chronicle of Higher Education, 2003
Describes how California's Peralta Community Colleges District decided to hire an outside company to manage its computer networks, but that problems cause it to now want a technology boss on its own staff. (EV)
Descriptors: Computer Networks, Computer Uses in Education, Information Technology, Problems
Stamps, David – Training, 1997
Information technology is not enough without knowledge management. People who oversee and support knowledge management are essential. The move to knowledge management systems may eclipse training and development unless trainers help people learn about learning and about sharing their knowledge. (JOW)
Descriptors: Adult Education, Computer Networks, Information Technology, Organizational Development
Wodarz, Nan – School Business Affairs, 1997
The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…
Descriptors: Computer Networks, Computer Security, Elementary Secondary Education, Internet
Nilsson, Fredrik – American School & University, 2002
Discusses affordable and practical security solutions, such as networked video systems, that are available to meet schools' needs for highly functional, low-cost surveillance. (EV)
Descriptors: Computer Networks, Crime Prevention, School Safety, Schools
King, Kenneth M. – EDUCOM Bulletin, 1988
Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)
Descriptors: Computer Networks, Computer Software, Computer Uses in Education, Ethics

Bechar-Israeli, Haya – Journal of Computer-Mediated Communication, 1995
Examines nicknames of Internet Relay Chat (IRC) users, whose identities are condensed into a single line which states their nicknames, the electronic address, and a slogan or the users' real names. Demonstrates that although people play games with their nicknames, the nicknames they choose are an inherent part of their Net identity and their…
Descriptors: Computer Mediated Communication, Computer Networks, Higher Education, Identification (Psychology)