NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,351 to 1,365 of 1,593 results Save | Export
Henderson, Dave – Technology & Learning, 2005
Providing quality technical support in K-12 environments can be challenging. Unlike the business world, there is generally a less-than-ideal ratio of technical staff to computers, numerous software titles from dozens of vendors, and of course--a much smaller budget. The Victor Central School District in Victor, New York, has employed a number of…
Descriptors: Computer Uses in Education, Technical Assistance, Elementary Secondary Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts
Peer reviewed Peer reviewed
Direct linkDirect link
Kremer, John F. – New Directions for Teaching and Learning, 2004
Can computers help with one of the most persistent challenges of large classes: the accurate and efficient measurement of student learning?
Descriptors: Computer Assisted Testing, Computer Security, Case Studies, Instructional Design
Peer reviewed Peer reviewed
Kuczynski, Kay; Gibbs-Wahlberg, Patty – Social Work, 2005
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 (PL. 104-191) is a multitiered, comprehensive, convoluted, and controversial federal law for sweeping health care reform. Although HIPAA is dramatically broader in scope than privacy protections for health care information, a provision for privacy in the form of a Privacy Rule…
Descriptors: Health Insurance, Privacy, Confidential Records, Patients
Peer reviewed Peer reviewed
Direct linkDirect link
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses and health office employees are the creators and caretakers of legal documentation. School nurses have an ethical and legal obligation to protect the integrity of electronic student health records. Although there are many threats to data integrity, from inadequate hardware to electrical surges, one of the most pervasive threats to…
Descriptors: School Nurses, Computer Security, School Health Services, Confidential Records
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Smith, Shana Shiang-Fong – Journal of Technology Studies, 2004
Due to the now widespread use of the Internet, most companies now require computer aided design (CAD) tools that support distributed collaborative design on the Internet. Such CAD tools should enable designers to share product models, as well as related data, from geographically distant locations. However, integrated collaborative design…
Descriptors: Intellectual Property, Internet, Distance Education, Computer Assisted Design
Peer reviewed Peer reviewed
Direct linkDirect link
Gamble, Cheryl – Community College Journal, 2005
The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…
Descriptors: Technological Advancement, National Security, Security (Psychology), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Bennett, Cedric – EDUCAUSE Quarterly, 2004
The Internet is a remarkable tool and change agent that has been successfully leveraged by colleges and universities to support, enhance, and extend the teaching/learning process; the creation of new knowledge through research; and the increasingly complex business of managing and administrating institutions. Although it supports and even creates…
Descriptors: State Legislation, Change Agents, Computer Security, Resource Allocation
Peer reviewed Peer reviewed
Direct linkDirect link
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – Discourse: Studies in the Cultural Politics of Education, 2007
Whilst the association of risk with schools is predominately a negative one, fostering images of potential dangers, this paper draws upon a socio-cultural counter-discourse to explore the perceived benefits of certain risk taking activities within educational establishments. Using research data on school Internet "misuse" it is argued…
Descriptors: Student Attitudes, Internet, Risk, Student Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2007
According to a January 2007 survey by the Pew Internet & American Life Project, 55 percent of teens (ages 12 to 17) report having created a personal profile online, and an equal number regularly use social networking sites such as MySpace or Facebook. Of those, 91 percent use the sites to stay in touch with friends they see frequently. With all…
Descriptors: Internet, Social Networks, Adolescents, Student Motivation
Martin, James; Samels, James E. – Chronicle of Higher Education, 2007
College and university presidents are increasingly called upon to make informed choices about technology. The rapidly shifting landscape makes it tough to keep up with change and innovation, let alone stay ahead of the curve. In this article, the authors discuss 10 trends to watch in campus technology. These trends are the following: (1) increased…
Descriptors: Educational Trends, Information Technology, Partnerships in Education, Proprietary Schools
Hare, Karen – ProQuest LLC, 2008
Implementation of information systems has lagged in many areas of clinical healthcare for a variety of reasons. Economics, data complexity and resistance are among the often quoted roadblocks. Research suggests that physicians play a major part in the adoption, use and diffusion of information technology (IT) in clinical settings. There are also…
Descriptors: Information Needs, Physicians, Information Systems, Information Technology
American Association of Community Colleges, 2006
Although homeland security has gained prominence as a national focus and investment, it is clear that much of the most effective preparation must begin at local, state, and regional levels. This report reveals that an astonishing number of community colleges offer degree and certificate programs for first responders--law enforcement officers,…
Descriptors: National Security, Community Colleges, Partnerships in Education, Crisis Management
Peer reviewed Peer reviewed
Direct linkDirect link
Kleinwachter, Wolfgang – E-Learning, 2006
This article addresses issues central to the task of Internet governance and, especially, to the management of the Internet's core resources. Early conceptions of the Internet as a virtual space that required no regulation resisted initial governance activity. More recently, work by people like Lawrence Lessig has clarified the complex…
Descriptors: Internet, Public Policy, Governance, Misconceptions
Pages: 1  |  ...  |  87  |  88  |  89  |  90  |  91  |  92  |  93  |  94  |  95  |  ...  |  107