Publication Date
| In 2026 | 0 |
| Since 2025 | 320 |
| Since 2022 (last 5 years) | 1860 |
| Since 2017 (last 10 years) | 4434 |
| Since 2007 (last 20 years) | 14616 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
| Teachers | 1017 |
| Practitioners | 737 |
| Media Staff | 283 |
| Administrators | 206 |
| Students | 188 |
| Policymakers | 143 |
| Researchers | 123 |
| Parents | 105 |
| Counselors | 52 |
| Community | 36 |
| Support Staff | 6 |
| More ▼ | |
Location
| Turkey | 734 |
| Australia | 675 |
| United Kingdom | 592 |
| Canada | 529 |
| United States | 525 |
| China | 335 |
| Taiwan | 332 |
| California | 318 |
| Spain | 228 |
| India | 222 |
| Germany | 206 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
| Meets WWC Standards without Reservations | 3 |
| Meets WWC Standards with or without Reservations | 3 |
| Does not meet standards | 3 |
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Peer reviewedSvenningsen, Karen – Bottom Line, 1998
Discusses the economic value of information and cost and benefit concepts. A subjective evaluation model for comparing the desirable and undesirable potential of library acquisition of an electronic information resource is then introduced. The model considers objectives, impact, costs, benefits, and alternatives, and lists evaluation criteria for…
Descriptors: Cost Effectiveness, Electronic Publishing, Evaluation Criteria, Evaluation Methods
Rukeyser, William L.; Kuersten, Joan – Our Children, 1998
Parents must be well-informed about computer technology in order to make appropriate decisions for their schools. The paper discusses pro's and con's of computers in the schools, the importance of dispelling myths about education and technology, and parents' roles in making decisions. (SM)
Descriptors: Computer Uses in Education, Educational Improvement, Educational Technology, Elementary Secondary Education
Peer reviewedWalther, James H.; Speisser, Nancy – Issues in Science & Technology Librarianship, 1997
Presents a model for medical reference source instruction. Focuses on identifying the potential audiences; conducting user and information assessments; creating and delivering models of training; and future goals. Includes a list of Internet healthcare sites. (AEF)
Descriptors: Information Retrieval, Information Seeking, Information Sources, Internet
Peer reviewedPerks, Dennis J.; Gavitt, Donna R.; Olivo, John J. – Computers & Education, 1997
Developing an Internet acceptable use policy is the first step in bringing technological change to the classroom. This article defines educator's proactive responsibilities and provides a policy shell (privilege, "netiquette," security, vandalism, legal issues, warranties, and user agreements) to formulate individual school policies.…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Guidelines
Peer reviewedBaker, Molly Herman – Mid-Western Educational Researcher, 1998
College faculty are pressured to use technology to improve teaching and achieve institutional goals but resist technology due to lack of time, funds, confidence, support staff, or accessibility. Over 30 concrete suggestions are offered for integrating technology into professional and teaching situations, including getting started, streamlining…
Descriptors: Attitude Change, Change Strategies, College Faculty, Computer Uses in Education
Peer reviewedVan Schie, Joop – European Journal of Teacher Education, 1997
The Dutch government conducted a project to promote information and communication technology (ICT) use in education. To systematically gather data on ICT use in other countries, the government began a continuous survey of best practice ICT use in education via printed and electronic resources and site visits. The final report is available on the…
Descriptors: Computer Uses in Education, Educational Technology, Elementary Secondary Education, Foreign Countries
Peer reviewedHeins, Marjorie – Academe, 1998
A 1998 court decision ruled that a recent Virginia law requiring official approval for state employees to put materials with "sexually explicit content" on the Internet was unconstitutional. However, the extent to which the First Amendment will protect academic freedom in cyberspace in this case and for other issues is not clear. (MSE)
Descriptors: Academic Freedom, College Faculty, Constitutional Law, Court Litigation
Woods, Judy C. – Technology Connection, 1998
Multi-user Object Oriented Internet activities (MOOs) permit real time interaction in a text-based virtual reality via the Internet. This article explains EduMOOs (educational MOOs) and provides brief descriptions, World Wide Web addresses, and telnet addresses for selected EduMOOs. Instructions for connecting to a MOO and a list of related Web…
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Computer Software, Educational Technology
Peer reviewedValauskas, Edward J. – Library Trends, 1997
A virtual association is more communicative, more responsive, and more attuned to the needs of its members and its profession than a traditional paper-based association. The benefits of a virtual association far outweigh the transitory demands made by technology by enhancing communication and connectivity between members, staff, and a truly global…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Oriented Programs, Global Approach
Carman, Jared; Boynton, Doug – Journal of Instruction Delivery Systems, 1997
Interactive multimedia training can be delivered via CD-ROM, hard drive, local area networks (LAN), wide area networks (WAN), Intranet, Internet and hybrid systems. This article presents a case study of how two companies (Los Angeles Times and Allen Communication) evaluated alternative delivery systems, chose one, and implemented multimedia…
Descriptors: Case Studies, Computer Assisted Instruction, Delivery Systems, Educational Technology
Kirriemuir, John; Brickley, Dan; Welsh, Susan; Knight, Jon; Hamilton, Martin – D-Lib Magazine, 1998
Describes characteristics of subject gateways on the Web (i.e., facilities allowing easier access to network-based resources in a defined subject area) and compares them to search engines (e.g., AltaVista). The application of WHOIS++, centroids, query routing, and forward knowledge to searching several gateways simultaneously is outlined, and…
Descriptors: Access to Information, Cataloging, Comparative Analysis, Gateway Systems
Peer reviewedSabella, Russell A. – Peer Facilitator Quarterly, 1998
Presents four computer applications that can complement the work of peer helper trainers and peer helpers themselves. The applications include multimedia presentations, databases, desktop publishing, and the Internet. The article describes each application and also discusses the use of electronic mail, KeyPals, Listserv, and the World Wide Web to…
Descriptors: Computer Uses in Education, Databases, Desktop Publishing, Educational Technology
Peer reviewedHarris, Pamela C.; Harris, Michael H.; Hannah, Stan A. – Internet and Higher Education, 1998
"Confronting Hypertext" is a collaborative project designed to investigate learning outcomes using hypertext-based instruction delivered via the Internet. This article describes the project and suggests ways to map student reactions (commitment to books, distrust of online information, confusion) in different professional programs,…
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Cooperative Programs, Educational Research
Uhler, Scott F.; Allison, Rinda Y. – Illinois Libraries, 1998
Examines the law for libraries, i.e. potential risks and liabilities of regulating, or not regulating, Internet access and use. Discusses the Communications Decency Act, use of filtering software, Internet policies, liability under local criminal statutes, ordinances for disseminating child pornography, obscene material, and hostile work…
Descriptors: Access to Information, Censorship, Court Litigation, Federal Legislation


