Publication Date
| In 2026 | 0 |
| Since 2025 | 56 |
| Since 2022 (last 5 years) | 373 |
| Since 2017 (last 10 years) | 645 |
| Since 2007 (last 20 years) | 1197 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Fredrick, Kathy – School Library Media Activities Monthly, 2009
A basic definition of "cyberbullying" is provided by Nancy Willard, director of the Center for Safe and Responsible Internet Use. She has defined cyberbullying as using the Internet or other mobile devices to send or post harmful or cruel text or images to bully others. The advent of social networking has highlighted cyberbullying. Library media…
Descriptors: Media Specialists, Internet, Library Role, Bullying
Ackerman, Amy S.; Krupp, Melissa L. – International Association for Development of the Information Society, 2012
Although school budgets have plummeted due to federal and state funding reductions, adopting Bring Your Own Technology (BYOT), may address monetary tightening while simultaneously infusing 21st century learning. Implementing BYOT may provide real, rigorous, and relevant learning for the students while posing higher-order thinking questions from…
Descriptors: Foreign Countries, Influence of Technology, Technology Uses in Education, Computer Security
Stauffer, Sterling; Heath, Melissa Allen; Coyne, Sarah Marie; Ferrin, Scott – Psychology in the Schools, 2012
Recent meta-analyses indicate that bully prevention programs produce minimal change in student behavior. This study examined 66 high school teachers' perceptions regarding the effect of cyberbullying on students, which intervening strategies teachers would use when dealing with cyberbullying, and which prevention strategies would assist in…
Descriptors: Prevention, Intervention, Student Behavior, Fidelity
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Simonson, Michael, Ed.; Seepersaud, Deborah, Ed. – Association for Educational Communications and Technology, 2021
For the forty-fourth time, the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented online and onsite during the annual AECT Convention. Volume 1 contains papers dealing primarily with research and development topics. Papers dealing with…
Descriptors: Educational Technology, Technology Uses in Education, Feedback (Response), Course Evaluation
Lawler, James P. – Information Systems Education Journal, 2011
The cloud continues to be a developing area of information systems. Evangelistic literature in the practitioner field indicates benefit for business firms but disruption for technology departments of the firms. Though the cloud currently is immature in methodology, this study defines a model program by which computer science and information…
Descriptors: Computer Science Education, Information Science Education, Information Systems, Computer Software
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Sharp, Linda – School Business Affairs, 2011
School system leaders never know when disaster may strike. Having a plan in place to protect vital data and systems is crucial. School system leaders need to be actively involved in crisis preparedness, planned response, and recovery to ensure student and staff safety and to make certain that all important operations, services, processes, and…
Descriptors: School Security, Crisis Management, Emergency Programs, School Safety
Doerr-Stevens, Candance; Beach, Richard; Boeser, Elizabeth – English Journal, 2011
This article discusses how students use online role-play to collaborate and change real school policy. Playing different characters in an online role-play, students explore controversial aspects of Internet filtering and adopt a plan to change their school's policy. Through engaging in collaborative argumentation during their role-play, students…
Descriptors: Online Courses, Peer Groups, School Policy, Role Playing
Willard, Nancy – Corwin, 2012
Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…
Descriptors: Child Safety, Computers, Internet, Secondary School Students
Anwar, M.; Greer, J. – IEEE Transactions on Learning Technologies, 2012
This research explores a new model for facilitating trust in online e-learning activities. We begin by protecting the privacy of learners through identity management (IM), where personal information can be protected through some degree of participant anonymity or pseudonymity. In order to expect learners to trust other pseudonymous participants,…
Descriptors: Computer Mediated Communication, Discussion, Client Server Architecture, Online Courses
Pusey, Portia; Sadera, William A. – Journal of Digital Learning in Teacher Education, 2012
In teacher education programs, preservice teachers learn about strategies to appropriately integrate computer-related and Internet-capable technologies into instructional settings to improve student learning. Many presume that preservice teachers have the knowledge to competently model and teach issues of safety when working with these devices as…
Descriptors: Preservice Teacher Education, Preservice Teachers, Standards, Laws

Direct link
Peer reviewed
