Publication Date
In 2025 | 26 |
Since 2024 | 164 |
Since 2021 (last 5 years) | 424 |
Since 2016 (last 10 years) | 648 |
Since 2006 (last 20 years) | 1226 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Branzburg, Jeffrey – Technology & Learning, 2007
In this article, the author relates how he discovered that not all Wi-Fi networks are secure. As such, he developed several strategies on how he can be secured whenever he connects to the Internet through a Wi-Fi connection. He discusses how one can change passwords, explains the process of encryption, and provides suggestions on other security…
Descriptors: Computer Security, Internet, Computer Peripherals, Telecommunications
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching
Jacka, Lisa; Booth, Kate – Australian Educational Computing, 2012
Virtual worlds are highly immersive, engaging and popular computer mediated environments being explored by children and adults. Why then aren't more teachers using virtual worlds in the classroom with primary and secondary school students? Reasons often cited are the learning required to master the technology, low-end graphics cards, poor…
Descriptors: Foreign Countries, Computer Security, Educational Technology, Regional Programs
Guernsey, Lisa – Chronicle of Higher Education, 2008
Colleges capture a slew of highly sensitive information on everyone on campus. While chief privacy officer has become a recognized title in the corporate world, higher education seems slow to pick up on the trend--a reluctance that could represent either head-in-the-sand thinking or fiscally prudent avoidance of bureaucratic bloat. This article…
Descriptors: Higher Education, Information Management, Information Policy, Confidential Records
Titus, Aaron – Chronicle of Higher Education, 2008
This article describes five organizational policies and behavior that put personal information in jeopardy. These are: (1) Inadequate security for old data; (2) Shadow systems and unregulated servers; (3) Unsophisticated privacy policies; (4) Improper use of Social Security numbers; and (5) Unsanitized old hard drives. Although the academic…
Descriptors: Privacy, Educational Environment, Internet, Data
Wilshusen, Gregory C.; Melvin, Valerie C. – US Government Accountability Office, 2009
The Veterans Benefits, Health Care, and Information Technology Act of 2006 authorizes the Secretary of Veterans Affairs to establish an educational assistance program for information security. The Information Security Education Assistance Program is envisioned as a means for the Department of Veterans Affairs (VA) to attract and retain individuals…
Descriptors: Veterans, Public Agencies, Computer Security, Information Technology
Jung, I. Y.; Yeom, H. Y. – IEEE Transactions on Education, 2009
While development of the Internet has contributed to the spread of online education, online exams have not been widely adopted. An online exam is defined here as one that takes place over the insecure Internet, and where no proctor is in the same location as the examinees. This paper proposes an enhanced secure online exam management environment…
Descriptors: Virtual Classrooms, Internet, Computer Security, Computer Uses in Education
Moller, Klaus – Campus-Wide Information Systems, 2007
Purpose: Grid computing has often been heralded as the next logical step after the worldwide web. Users of grids can access dynamic resources such as computer storage and use the computing resources of computers under the umbrella of a virtual organisation. Although grid computing is often compared to the worldwide web, it is vastly more complex…
Descriptors: Computer Security, Computer Networks, Foreign Countries, Internet
del Moral Talabis, Mark Ryan – AACE Journal, 2007
Learning IT Security in a classroom setting has often been a frustrating endeavor for both instructors and students alike. From our experience, traditional instructional methods like direct instruction and lectures though widely used and effective in most other areas have significant shortcomings when applied in IT security learning. In this…
Descriptors: Feedback (Response), Teaching Methods, Methods, Information Technology
Woollard, John – Routledge, Taylor & Francis Group, 2011
"Psychology for the Classroom: E-Learning" is a lively and accessible introduction to the field of technology-supported teaching and learning and the educational psychology associated with those developments. Offering a substantial and useful analysis of e-learning, this practical book includes current research, offers a grounding in both theory…
Descriptors: Electronic Learning, Blended Learning, Social Justice, Constructivism (Learning)
Duffy, Kevin P.; Davis, Martin H., Jr.; Sethi, Vikram – Journal of Information Systems Education, 2010
We explore the feasibility of sparking student curiosity and interest in the core required MIS operating systems course through inclusion of computer forensics exercises into the course. Students were presented with two in-class exercises. Each exercise demonstrated an aspect of the operating system, and each exercise was written as a computer…
Descriptors: Student Attitudes, Relevance (Education), Lesson Plans, Learner Engagement
Sheard, Reed – EDUCAUSE Quarterly, 2010
When the author was brought on as CIO of Westmont College in October 2008, the president, Board of Trustees, and campus environment made it clear that technology needed a major overhaul to meet the college's growing requirements. Also, these changes needed to happen without significantly increasing the IT budget or staff. Marketing Charts…
Descriptors: Problem Solving, Computer Mediated Communication, Educational Finance, Innovation
Kuhn, Robert M.; Brookes, Kimberly H.; Bellos, Nephellie – EDUCAUSE Quarterly, 2008
Discussions with a central IT organization about integration with existing systems on campus, support costs for the new implementation, and total cost of ownership frequently become adversarial. Simmons College, a small college in Boston with an enrollment of approximately 1,900 undergraduate and 2,800 graduate students, reframed these issues in…
Descriptors: Small Colleges, Educational Technology, Information Technology, School Policy
Juvonen, Jaana; Gross, Elisheva F. – Journal of School Health, 2008
Background: Bullying is a national public health problem affecting millions of students. With the rapid increase in electronic or online communication, bullying is no longer limited to schools. The goal of the current investigation was to examine the overlap among targets of, and the similarities between, online and in-school bullying among…
Descriptors: Computer Mediated Communication, Bullying, Parent Education, Internet
Chiwaraidzo Judith Nyabando – ProQuest LLC, 2008
A mixed-methods study, conducted in 2007-2008, designed to quantify and assess behaviors that either protect or expose data at academic institutions to information security attacks. This study focused on computing practices at two academic institutions: East Tennessee State University and Milligan College. Interviews with six information…
Descriptors: Information Technology, Professional Personnel, School Personnel, College Faculty