Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 3 |
| Distance Education | 2 |
| Foreign Countries | 2 |
| Information Policy | 2 |
| Information Technology | 2 |
| Internet | 2 |
| Action Research | 1 |
| After School Programs | 1 |
| At Risk Students | 1 |
| Biotechnology | 1 |
| Blended Learning | 1 |
| More ▼ | |
Publication Type
| Reports - Evaluative | 3 |
| Books | 2 |
| Collected Works - General | 1 |
Education Level
| Adult Education | 1 |
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
| Practitioners | 3 |
| Administrators | 1 |
| Media Staff | 1 |
| Researchers | 1 |
| Teachers | 1 |
Location
| Canada | 1 |
| Pennsylvania | 1 |
| South Africa | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Dempsey, Bert J., Ed.; Jones, Paul, Ed. – 1998
This book gives an overview of the leading-edge Internet application areas (streaming multimedia, collaborative tools, Web databases) and key information policy issues (privacy, censorship, information quality, and more). The text serves as a primer on understanding the forces--economic, legal, social, as well as technological--that are shaping…
Descriptors: Censorship, Computer Security, Databases, Distance Education
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software

Direct link
