Publication Date
| In 2026 | 0 |
| Since 2025 | 15 |
| Since 2022 (last 5 years) | 94 |
| Since 2017 (last 10 years) | 214 |
| Since 2007 (last 20 years) | 751 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Practitioners | 401 |
| Teachers | 174 |
| Administrators | 148 |
| Policymakers | 90 |
| Media Staff | 56 |
| Researchers | 55 |
| Students | 24 |
| Parents | 12 |
| Community | 5 |
| Counselors | 2 |
Location
| Canada | 95 |
| United States | 80 |
| United Kingdom | 59 |
| Australia | 47 |
| California | 38 |
| Texas | 33 |
| Japan | 30 |
| New York | 30 |
| Florida | 25 |
| Pennsylvania | 25 |
| Finland | 22 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Does not meet standards | 1 |
Peer reviewedDeMauro, Karen – Educause Quarterly, 2001
Describes how Clarion and Edinboro universities bundled their university-related telecommunications services with residence hall services and sought a vendor consortia to install and manage those services. In return for long-term contracts granting the right to sell services, the two consortia invested money to install data networks in the…
Descriptors: College Housing, Computer Networks, Corporate Support, Dormitories
Peer reviewedVan Buren, Cassandra – Journal of Information Ethics, 2001
Discussion of the need for ethical computing strategies and policies at the K-12 level to acculturate computer hackers away from malicious network hacking focuses on a three-year participant observation ethnographic study conducted at the New Technology High School (California) that examined the school's attempts to socialize its hackers to act…
Descriptors: Computer Networks, Computer Uses in Education, Elementary Secondary Education, Ethical Instruction
Peer reviewedPettenati, M. C.; Giuli, D.; Khaled, O. Abou – Journal of Technology and Teacher Education, 2001
Highlights the problems related to the development of professionals in the field of educational technology and defines a series of new professional roles, skills, and competencies needed to respond to the job market demands. Presents a model for professionals involved in the development of network-based courses. (Author/LRW)
Descriptors: Competence, Computer Networks, Educational Technology, Information Technology
Koper, Rob; Tattersall, Colin – British Journal of Educational Technology, 2004
The requirements placed on learning technologies to support lifelong learning differ considerably from those placed on technologies to support particular fragments of a learning lifetime. The time scales involved in lifelong learning, together with its multi-institutional and episodic nature are not reflected in todays mainstream learning…
Descriptors: Adult Education, Information Networks, Computer Networks, Lifelong Learning
Henderson, Dave – Technology & Learning, 2005
Providing quality technical support in K-12 environments can be challenging. Unlike the business world, there is generally a less-than-ideal ratio of technical staff to computers, numerous software titles from dozens of vendors, and of course--a much smaller budget. The Victor Central School District in Victor, New York, has employed a number of…
Descriptors: Computer Uses in Education, Technical Assistance, Elementary Secondary Education, Computer Software
Koivusaari, Ritva – Educational Psychology, 2004
This study analyzed what kind of role sociometric status has in non-real time computer conversations. Computer-supported conversations were investigated by using two local area networks. Participants were 52 9 to 10-year-old schoolchildren selected from three sociometric strata: rejected, average, and popular. Children's preferred friends, school…
Descriptors: Computer Mediated Communication, Gender Differences, Sociometric Techniques, Social Networks
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts
Cantrell, Pamela; Knudson, Mark S. – Computers in the Schools, 2006
Participants in a science professional development field experience were surveyed for their perceptions of the impacts of integrating a wireless local area network (WLAN), pocket PCs, and laptops as tools for enhancing science inquiry. Pocket PCs and laptops were used for data collection and analysis and for communication of research results to…
Descriptors: Field Experience Programs, Data Collection, Educational Technology, Inquiry
McAnear, Anita – Learning & Leading with Technology, 2006
When we planned the editorial calendar with the topic ubiquitous computing, we were thinking of ubiquitous computing as the one-to-one ratio of computers to students and teachers and 24/7 access to electronic resources. At the time, we were aware that ubiquitous computing in the computer science field had more to do with wearable computers. Our…
Descriptors: Computer Networks, Telecommunications, Computer Uses in Education, Internet
Marginson, Simon – Academe, 2004
In "The Information Age: Economy, Society, and Culture," sociologist Manuel Castells argues that information and communication technologies are associated with a new kind of economy, society, and culture that he calls "informationalism." In this new economic order, knowledge generation, information processing, and symbolic communication--"the…
Descriptors: Information Technology, Information Literacy, Telecommunications, Global Approach
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Cole, David R. – E-Learning, 2007
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process…
Descriptors: Electronic Learning, Terrorism, Internet, Educational Technology
Dobrogowski, W.; Maziewski, A.; Zablotskii, V. – European Journal of Physics, 2007
We describe our experience in building a remote laboratory for teaching magnetic domains. Fulfilling the proposed on-line experiments, students can observe and study magnetization processes that are often difficult to explain with written material. It is proposed that networks of remotely accessible laboratories could be integrated in the Global…
Descriptors: Science Laboratories, Magnets, Scientific Concepts, Science Experiments
Donohue, Sue; Herres, Lorelei – 1995
This study was designed to solicit responses from senior citizens (adults over the age of 55) who had enrolled in a computer course after retirement. The information is intended to aid program planners for seniors in developing future courses. Seventy-six seniors from four local sites (Puget Sound, Washington) and two nationwide online services…
Descriptors: Computer Networks, Computer Science Education, Course Evaluation, Course Objectives
Neal, Nancy L. – 1995
The World Wide Web (WWW) has become a major presence on the Internet, and teachers are just beginning to discover many valuable applications the Web can have in their classrooms. This study explored use of WWW as a research and publication tool in a fifth grade class project on the formation of the United States. Students were given instruction in…
Descriptors: Computer Networks, Computer Uses in Education, Grade 5, History Instruction

Direct link
