Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Access to Information | 4 |
| Computer Security | 4 |
| Computer Software | 3 |
| Educational Technology | 3 |
| Internet | 3 |
| Educational Planning | 2 |
| Elementary Secondary Education | 2 |
| Ethics | 2 |
| Foreign Countries | 2 |
| Higher Education | 2 |
| Privacy | 2 |
| More ▼ | |
Author
| Colman, Sue | 1 |
| Johnson, Doug | 1 |
| Szuba, Tom | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
| Books | 1 |
| Collected Works - Serial | 1 |
| Guides - Classroom - Teacher | 1 |
| Guides - Non-Classroom | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Higher Education | 1 |
Audience
| Administrators | 4 |
| Practitioners | 2 |
| Teachers | 2 |
Location
| Australia | 1 |
| Brazil | 1 |
| California | 1 |
| New York | 1 |
| Tennessee | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Colman, Sue – Australian Universities' Review, 1997
Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…
Descriptors: Access to Information, College Administration, Computer Security, Confidentiality
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This January 30, 2004 issue of "Chronicle for Higher Education" includes the following articles: (1) "Fighting to Get out of a Rio Slum" (Lloyd, Marion); (2) "Against…
Descriptors: Slums, Adolescents, Foreign Countries, Student Organizations

Direct link
Peer reviewed
