Publication Date
| In 2026 | 0 |
| Since 2025 | 56 |
| Since 2022 (last 5 years) | 373 |
| Since 2017 (last 10 years) | 645 |
| Since 2007 (last 20 years) | 1197 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Miseviciene, Regina; Ambraziene, Danute; Tuminauskas, Raimundas; Pažereckas, Nerijus – Informatics in Education, 2012
Many factors influence education nowadays. Educational institutions are faced with budget cuttings, outdated IT, data security management and the willingness to integrate remote learning at home. Virtualization technologies provide innovative solutions to the problems. The paper presents an original educational infrastructure using virtualization…
Descriptors: Computer Simulation, Universities, College Students, College Faculty
Liu, Anyi – ProQuest LLC, 2012
With increasing demand of mobile devices and cloud computing, it becomes increasingly important to develop efficient mobile application and its secured backend, such as web applications and virtualization environment. This dissertation reports a systematic study of mobile application development and the security issues of its related backend. …
Descriptors: Management Systems, Telecommunications, Internet, Databases
Pacharintanakul, Peera – ProQuest LLC, 2010
As the Internet moves towards a three-layer architecture consisting of overlay networks on top of the IP network layer on top of WDM-based physical networks, incorporating the interaction between and among network layers is crucial for efficient and effective implementation of survivability. This dissertation has four major foci as follows:…
Descriptors: Computer System Design, Internet, Efficiency, Computer Security
Mohanna, Mahmoud; Capus, Laurence – International Association for Development of the Information Society, 2013
This paper presents a mobile learning application for a learning course at higher education level. Based on the RSS feed technology, the presented mobile application establishes an in-time communication channel between the instructor and his/her students to keep them up-to-date with all course important dates, instructions and information in…
Descriptors: Technology Uses in Education, Educational Technology, Electronic Learning, Telecommunications
California Community Colleges, Chancellor's Office, 2014
This 16th annual report highlights up-to-date information on the programs supported through the Chancellor's Office Telecommunications and Technology Infrastructure Program (TTIP). To summarize 2012-13, one would describe it as a year of planning and preparation. The system-wide budget cuts of the past few years, reports of impacted classes, staff…
Descriptors: Community Colleges, Telecommunications, Technology Integration, Technology Uses in Education
Geng, Lihua – Higher Education Studies, 2011
In the process of textbook management of universities, the flow of storage, collection and check of textbook is quite complicated and daily management flow and system also seriously constrains the efficiency of the management process. Thus, in order to combine the information management model and the traditional management model, it is necessary…
Descriptors: Management Information Systems, Information Management, Database Design, Database Management Systems
Waters, John K. – T.H.E. Journal, 2011
The need to maintain an unpolluted learning environment is no easy task for schools and districts that have incorporated social networking sites into their educational life. The staff and teachers at Blaine High School in Minnesota's Anoka-Hennepin District 11 had been considering the pros and cons of establishing a school Facebook page when the…
Descriptors: Social Networks, Web Sites, Educational Environment, High Schools
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Mattord, Herbert J. – ProQuest LLC, 2012
Organizations continue to rely on password-based authentication methods to control access to many Web-based systems. This research study developed a benchmarking instrument intended to assess authentication methods used in Web-based information systems (IS). It developed an Authentication Method System Index (AMSI) to analyze collected data from…
Descriptors: Internet, Electronic Learning, Comparative Analysis, Benchmarking
Schneider, Tod – National Clearinghouse for Educational Facilities, 2010
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Descriptors: School Security, Information Technology, Safety, School Personnel
White, Kerry-Ann – ProQuest LLC, 2012
Given the lack of computer diffusion studies in the Caribbean, and coupled with the necessity to understand Jamaica in efforts to get a clearer global representation of the digital divide, this study takes an exploratory approach and examines the differences of the computer technology adoption and diffusion attitudes and viewpoints between the…
Descriptors: Foreign Countries, Educational Technology, Information Technology, Technology Integration
Wills, Lisa M. – New England Journal of Higher Education, 2011
When an individual hears the term risk, he/she usually thinks of the financial institutions whose mismanagement of risk was instrumental in causing the 2008 financial crash. But all organizations, including colleges and universities, face various types and levels of risk, which threaten to harm the institutions and their ability to fulfill their…
Descriptors: Higher Education, Risk Management, Risk, Access to Information
Petersen, Rodney – EDUCAUSE Review, 2011
The sourcing of IT systems and services takes many shapes in higher education. Campus central IT organizations are increasingly responsible for the administration of enterprise systems and for the consolidation of operations into a single data center. Specialized academic and administrative systems may be run by local IT departments. In addition,…
Descriptors: Higher Education, Information Technology, Risk Management, Computer Security

Direct link
Peer reviewed
