NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 361 to 375 of 405 results Save | Export
Peer reviewed Peer reviewed
Akkoyunlu, Buket; Orhan, Feza – TechTrends, 2001
Focuses on the Turkish educational system, technological developments, and changing educational needs. Discusses instructional technology programs in Turkey; new information technology (IT) policies in Turkey; the World Bank supported "Project for Globalization in Education 2000"; IT policies for teacher training programs; and the…
Descriptors: Computer Uses in Education, Educational Development, Educational Objectives, Educational Principles
Peer reviewed Peer reviewed
Foster, John – T.H.E. Journal, 1996
Presents highlights of abstracts submitted for the 13th International Conference on Technology and Education (ICTE). Topics include Internet policy and practice, classroom/curriculum issues, K-12 technology standards, tools, copyright, networked computing, and aid for developing nations. Lists areas of concern not addressed by conference…
Descriptors: Computer Networks, Computer Uses in Education, Conferences, Copyrights
Wedgeworth, Robert – American Libraries, 1998
Presents a global perspective on libraries and access to information. Topics include information policies, including intellectual property rights and censorship issues; the education and training of librarians; demographics and cultural changes; government and non-government activities; and the role of IFLA (International Federation of Library…
Descriptors: Access to Information, Cultural Influences, Demography, Global Approach
Peer reviewed Peer reviewed
Direct linkDirect link
Bergren, Martha Dewey – Journal of School Nursing, 2005
School nurses are caretakers of a vast amount of sensitive student and family health information. In schools, older computer hardware that previously stored education records is recycled for less demanding student and employee functions. Sensitive data must be adequately erased before electronic storage devices are reassigned or are discarded.…
Descriptors: Health Services, Confidential Records, Student Records, Privacy
Hernon, Peter, Ed.; And Others – 1996
This book uses a cross-disciplinary approach to profile developments through November 1995 concerning important U.S. government information policy issues. Information policy analyses benefit from a historical perspective while seeking to identify current areas of agreement and disagreement, especially at a time when the United States is moving…
Descriptors: Access to Information, Archives, Depository Libraries, Electronic Text
Harris, Michael H.; Hannah, Stan A. – 1996
In 1962, Harvard sociologist Daniel Bell began distributing and discussing a draft paper in which he introduced the concept of the "post-industrial" or "information" society. This idea has been the subject of intense and often insightful analysis by proponents and critics from a vast range of disciplinary sites. Until now, the…
Descriptors: Access to Information, Change, Futures (of Society), Information Management
New York State Forum for Information Resource Management. – 2000
This annual report of the New York State Forum for Information Resource Management begins with a section that summarizes key activities for 1999-2000, including partnerships with other organizations, efforts to promote effective technology workforce planning in New York State government, tracking information management developments related to…
Descriptors: Agency Cooperation, Annual Reports, Cooperative Programs, Educational Technology
Peer reviewed Peer reviewed
Sprehe, J. Timothy – Government Information Quarterly, 1997
The United States Bureau of the Census is making the Internet and other electronic systems the primary sources for its statistics and is actively seeking user feedback on its systems design activities. Discusses the design principles of the Data Access and Dissemination System (DADS) and policy issues of pricing/cost recovery, partnerships, and…
Descriptors: Access to Information, Computer System Design, Costs, Databases
Peer reviewed Peer reviewed
Merry, Lois K. – Journal of Interlibrary Loan, Document Delivery & Information Supply, 1996
To protect their copyrights, electronic publishers and document delivery providers track usage and personal information which threatens library users' privacy and rights to intellectual freedom and access to information. Suggests using data encryption software as a solution. Recommends librarians advocate a competitive marketplace by working for…
Descriptors: Access to Information, Computer Software, Copyrights, Document Delivery
Shraiberg, Yakov L. – Microcomputers for Information Management, 1994
Gives an overview of past, present, and future developments the of Russian information infrastructure with emphasis on sci-tech information (STI). Research presented includes survey of the state STI system; STI infrastructure in transition; acquisition of foreign sci-tech publications; user needs; budgetary funding of scientific and information…
Descriptors: Computer Networks, Computers, Economic Factors, Foreign Countries
Peer reviewed Peer reviewed
Direct linkDirect link
Quigley, Marian; Blashki, Kathy – Information Technology in Childhood Education Annual, 2003
Concern about children and the Internet is the latest in a ritual cycle of moral panics surrounding new technologies. Such panics often focus on children and are related to adult anxieties surrounding the transgression of boundaries including those between adult/child, private/public, and work/leisure. They are also founded on technological…
Descriptors: Internet, Influence of Technology, Mass Media Effects, Science and Society
Shenouda, Wagih; Johnson, Gretchen – 1995
The Educational Technology Center and the Teacher Education Program at the SUNY College at Old Westbury (New York) used a cooperative approach to integrate computer technology into the teacher education curriculum and to train pre-service teachers how to use this technology successfully in the classroom. In 1989, the Teacher Education Program felt…
Descriptors: Computer Centers, Computer Literacy, Computer Selection, Computer Software Selection
Lucas, Leslie A. – 1998
Academic computing directors must focus on what actions and policies make a well-coordinated academic computing help desk function effectively. Keeping in mind the needs of both the client and the support team, the key components of a well-managed help desk include: accessing help easily; sorting support team jobs effectively; distributing support…
Descriptors: Access to Information, Computer Uses in Education, Databases, Educational Administration
Miller, Teresa N.; Shoop, Robert J. – National Association of Secondary School Principals (NASSP), 2004
Gloria, a first-year principal at Sunflower High School, sighed as she stared at her computer screen. She had been asked to write letters of reference for three teachers who were leaving her school. The first resigned among rumors of misconduct with a student--but before an investigation began. The second was asked to resign after a school…
Descriptors: Court Litigation, Fear, Principals, Teacher Evaluation
1996
Five papers focusing on censorship include: "Censorship: Planning a Safe Ride on the Superhighway" (Daniel Ingvarson); "Censorship and the Need to Develop Policy" (Phil Davidson); "Are You Feeling the Internet Backlash?, or Family Friendly Digital Libraries and Banned URLs Week" (Steve Cisler); "Developing a School Internet Management Plan" (Jack…
Descriptors: Access to Information, Censorship, Computer Mediated Communication, Computer Uses in Education
Pages: 1  |  ...  |  17  |  18  |  19  |  20  |  21  |  22  |  23  |  24  |  25  |  26  |  27