Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 3 |
| Since 2017 (last 10 years) | 4 |
| Since 2007 (last 20 years) | 19 |
Descriptor
Source
Author
| Alexander, Charles | 1 |
| Blazer, Christie | 1 |
| Boyle, Clifton J., III | 1 |
| Brown, David S. | 1 |
| Collins, Hilton | 1 |
| Crawford, Margaret, Ed. | 1 |
| David Walker | 1 |
| Evo Popoff | 1 |
| Fan, Andy | 1 |
| Garland, Virginia E. | 1 |
| Henderson, Dave | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 10 |
| Reports - Descriptive | 9 |
| Reports - Research | 6 |
| Books | 4 |
| Dissertations/Theses -… | 4 |
| Collected Works - Proceedings | 2 |
| Guides - Classroom - Teacher | 2 |
| Guides - Non-Classroom | 1 |
| Information Analyses | 1 |
Education Level
| Elementary Secondary Education | 22 |
| Higher Education | 3 |
| Elementary Education | 2 |
| Postsecondary Education | 2 |
| Junior High Schools | 1 |
| Middle Schools | 1 |
| Secondary Education | 1 |
Audience
| Administrators | 3 |
| Teachers | 2 |
| Policymakers | 1 |
| Practitioners | 1 |
Location
| United States | 3 |
| Algeria | 1 |
| Arizona | 1 |
| Asia | 1 |
| Bulgaria | 1 |
| California | 1 |
| Canada | 1 |
| China | 1 |
| Florida | 1 |
| Hungary | 1 |
| Indonesia | 1 |
| More ▼ | |
Laws, Policies, & Programs
| Equal Access | 2 |
| Digital Millennium Copyright… | 1 |
Assessments and Surveys
| Trends in International… | 1 |
What Works Clearinghouse Rating
Valarian Couch – ProQuest LLC, 2024
Internet-enabled tools, cloud-based platforms, and digital communication devices have revolutionized the educational landscape but this digital transformation has increased students' exposure to cyber risks and threats exponentially. The purpose of this quantitative correlational study was to investigate the relationship between technology…
Descriptors: Elementary School Students, Middle School Students, Secondary School Students, Parents
Alexander, Charles – ProQuest LLC, 2018
Encryption based ransomware operates by iterating through all files with specific extensions on the computer and mutating them into an unusable form. The mutation, in many cases, can only be reversed if the user pays the operator of the ransomware a fee to get their files back. K-12 school districts have fallen victim to rampant malware as a…
Descriptors: Computer Security, School Districts, Elementary Secondary Education, Computer Uses in Education
Keith Lee; Evo Popoff; David Walker – State Educational Technology Directors Association, 2025
The 2025 State Educational Technology Directors Association (SETDA) State EdTech Trends Survey explores how the systems, infrastructure, and staffing that digital learning depends on will be sustained, how new flexibilities in federal formula and discretionary funding can be leveraged, what edtech tools are essential, and how to balance innovation…
Descriptors: Educational Technology, Educational Trends, Technology Uses in Education, Elementary Secondary Education
Mack Shelley, Editor; Omer Tayfur Ozturk, Editor – International Society for Technology, Education, and Science, 2024
"Proceedings of International Conference on Research in Education and Science" includes full papers presented at the International Conference on Research in Education and Science (ICRES) which took place on April 27-30, 2024, in Antalya, Turkey. The aim of the conference is to offer opportunities to share ideas, discuss theoretical and…
Descriptors: STEM Education, Second Language Learning, Second Language Instruction, English (Second Language)
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Linworth, 2012
If you're new to running a library or looking for a refresher, this book can serve as your first reference source for school library operation, providing overview information on a wealth of topics, lists of resources for more in-depth information, and coverage of current topics such as Web 2.0, fundraising, digital booktalks, and cybersafety.…
Descriptors: Fund Raising, Library Administration, School Libraries, Library Automation
Blazer, Christie – Research Services, Miami-Dade County Public Schools, 2009
More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…
Descriptors: Web Sites, Social Networks, Information Technology, Internet
de Abreu, Belinha S. – Peter Lang New York, 2011
This book, a resource for educators, uses the theme of media literacy as a lens through which to view and discuss social networking and Web 2.0 environments. There is ongoing and positive research on the participatory culture created by youth who are heavily involved in the new digital technologies, yet schools tend to avoid these mediums for fear…
Descriptors: Media Literacy, Internet, Social Networks, Electronic Publishing
Mekdeci, Kelly Broyles – ProQuest LLC, 2011
United States schools and American Overseas (A/OS) schools depend upon educational technology (ET) to support business operations and student learning experiences. Schools rely upon administrative software, on-line course modules, information databases, digital communications systems, and many other ET processes. However, ET's fragility compared…
Descriptors: Foreign Countries, Educational Technology, Computer Uses in Education, Institutional Mission
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Boyle, Clifton J., III – ProQuest LLC, 2010
Misuse of technology is a behavioral pattern that continues to emerge in our society. Television and newspapers continue to list and report technology misuse. A recent study from the Pew Internet and American Life Project has indicated approximately one third of teen are victims of online harassment (Lenhart, 2009). Other prominent problems with…
Descriptors: Control Groups, Urban Schools, Citizenship, Video Games
Hoffman, Richard – Technology & Learning, 2007
Wireless connectivity in schools is all the rage, and many school systems have at least gotten their feet wet with a wireless lab or a few portable laptop carts. But Bijaya Devkota, the chief information officer of Charles County Public Schools, has done what many school systems only dream of--implemented universal wireless access throughout his…
Descriptors: Computer Networks, Telecommunications, Computer Uses in Education, Public Schools
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Previous Page | Next Page ยป
Pages: 1 | 2
Direct link
Peer reviewed
