NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,546 to 1,560 of 1,635 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Beasley, William; Dobda, Kathyanne W.; Wang, Lih-Ching Chen – International Journal of Instructional Media, 2005
In recent years laptop computers have become increasingly popular in educational settings; wireless connectivity is a more recent development which is only now being fully explored, and which has led to the creation of the "wireless laptop lab." In this article, the authors share some of the experiences and concerns that they have encountered…
Descriptors: Telecommunications, Computer Interfaces, Computer Uses in Education, Educational Technology
Direct Marketing Association, Washington, DC. – 1997
The ability to meet people, visit places around the globe, and make purchases online has added a new dimension to teaching children about the opportunities and accompanying risks that exist in everyday life. The Direct Marketing Association has created this guide to information use, behavior, and privacy on the Internet to help parents supervise…
Descriptors: Computer Attitudes, Computer Security, Electronic Mail, Information Industry
Galbreath, Jeremy, Ed. – Educational Technology, 1997
Examines the "reality behind the hype" surrounding the Internet. Discusses its early development; growth and present state; and key applications, including e-mail, voice/video telephony, integrated messaging, electronic commerce, the World Wide Web, and Web commerce, Intranet, Extranet; education and training; security; ownership; and…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Oriented Programs, Computer Security
Wakabayashi, Ippei – Educom Review, 1997
Discusses social and cultural challenges that Internet technology raises. Highlights include preserving the freedom in cyberspace, the information distribution scheme of the Internet, two-way interactivity, search engines as marketing tools, the insecurity of cyberspace, online safety rules for children, educating children to "walk…
Descriptors: Access to Information, Child Safety, Computer Mediated Communication, Computer Security
Yrchik, John; Cradler, John – ED, Education at a Distance, 1994
Discusses guidelines that were developed to ensure that the National Information Infrastructure provides expanded opportunities for education and training. Topics include access requirements for homes and work places as well as schools; education and training application requirements, including coordination by federal departments and agencies; and…
Descriptors: Access to Computers, Access to Information, Computer Assisted Instruction, Computer Security
Spoor, Dana L. – American School & University, 1996
School districts are integrating security and life-safety systems into school buildings to protect students and property. This proactive approach includes sprinkler systems, fire alarms, and security systems that monitor door movement. Some school districts that are incorporating the latest life-safety technology are in Missouri, Ohio, California,…
Descriptors: Alarm Systems, Building Innovation, Built Environment, Computer Security
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
EDUTECH Report, 1993
This newsletter examines education technology issues of concern to school faculty and administrators. Regular features in each issue include educational technology news, a book review, and a question and answer column. The cover articles during this volume year are: "Data Access Issues: Security Vs. Openness"; "Creation of an…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Decision Making
Stubbs, Keith M. – 1996
This document defines the specific standards and general guidelines which the U.S. Department of Education (ED) will use to make information available on the World Wide Web (WWW). The purpose of providing such guidance is to ensure high quality and consistent content, organization, and presentation of information on ED WWW servers, in order to…
Descriptors: Access to Information, Computer Security, Computer System Design, Disabilities
Hinga, Sophia W.; Chen, Linlin Irene – 1998
With the assistance of learning technology consultants in the Technology Teaching and Learning Center (TTLC) at the University of Houston-Downtown (Texas), professors have shifted their paradigms and are taking the leap to use more high-risk World Wide Web technologies in their courses. One that has become a hallmark is delivering exams via the…
Descriptors: Authoring Aids (Programming), Computer Assisted Testing, Computer Managed Instruction, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Odabasi, H. Ferhan – Turkish Online Journal of Educational Technology - TOJET, 2005
Children's effective use of Internet relies heavily on the factors surrounding them, thus parents' views and attitudes are crucial for elementary children's productive use of Internet. Besides, parental awareness on Internet helps parents to reflect to the related issues of Internet. This study tries to reveal the elementary school children's…
Descriptors: Internet, Parent Attitudes, Mass Media Use, Elementary School Students
American Association of Community Colleges, Washington, DC. – 2002
The education and training of the cybersecurity workforce is an essential element in protecting the nation's computer and information systems. On June 26-28, 2002, the National Science Foundation supported a cybersecurity education workshop hosted by the American Association of Community Colleges. The goals of the workshop were to map out the role…
Descriptors: Community Colleges, Computer Security, Computers, Crime
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This January 16, 2004 issue of "Chronicle for Higher Education" contains the following articles: (1) "Gymnasium, Ecology Lab, Sentinel" (Selingo, Jeffrey); (2) "Fewer…
Descriptors: Ecology, Higher Education, Foreign Countries, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Pages: 1  |  ...  |  99  |  100  |  101  |  102  |  103  |  104  |  105  |  106  |  107  |  108  |  109