Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 8 |
Descriptor
Data | 9 |
Internet | 9 |
Information Storage | 8 |
Information Management | 6 |
Computer Security | 5 |
Information Technology | 5 |
Computer Software | 4 |
Privacy | 4 |
Users (Information) | 4 |
Computers | 3 |
Foreign Countries | 3 |
More ▼ |
Source
Author
Bennett, Cedric | 1 |
Goldsborough, Reid | 1 |
Hermida, Martin | 1 |
Imlig-Iten, Nina | 1 |
Jiang, Yu | 1 |
Johnson, LeAnne D. | 1 |
Kong, Lingkai | 1 |
Lazarinis, Fotis | 1 |
Li, Sheng | 1 |
Marinus, Eva | 1 |
Schrackmann, Iwan | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Reports - Research | 3 |
Books | 1 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Early Childhood Education | 1 |
Audience
Policymakers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hermida, Martin; Imlig-Iten, Nina; Schrackmann, Iwan; Marinus, Eva – Teaching Education, 2023
With the ubiquity of digital media, managing personal data has become part of our daily lives. Teachers have to manage not only their own data, they also manage students' sensitive data and furthermore have to teach data protection to students. In Switzerland, teacher education colleges have hence started to educate students about privacy and data…
Descriptors: Preservice Teachers, Student Attitudes, Social Networks, Data
Shen, Yang; Yin, Xin; Jiang, Yu; Kong, Lingkai; Li, Sheng; Zeng, Haijun – Lecture Notes in Educational Technology, 2023
This book includes 43 case studies showcasing the application of basic education informatization. It shares the experiences of 43 schools in the construction and application of educational informatization in various regions in China. It aims to promote the balanced development of education and expand the coverage of quality education resources.…
Descriptors: Information Technology, Technology Uses in Education, Internet, Artificial Intelligence
Johnson, LeAnne D. – Topics in Early Childhood Special Education, 2017
Data-driven decision making is central to improving success of children. Actualizing the use of data is challenging when addressing the social, emotional, and behavioral needs of children across different types of early childhood programs (i.e., early childhood special education, early childhood family education, Head Start, and childcare).…
Descriptors: Teamwork, Problem Solving, Educational Technology, Technology Uses in Education
Sundareswaran, Smitha – ProQuest LLC, 2014
Much like its meteorological counterpart, "Cloud Computing" is an amorphous agglomeration of entities. It is amorphous in that the exact layout of the servers, the load balancers and their functions are neither known nor fixed. Its an agglomerate in that multiple service providers and vendors often coordinate to form a multitenant system…
Descriptors: Information Storage, Internet, Information Management, Adoption (Ideas)
Lazarinis, Fotis – Education and Information Technologies, 2014
iLM is a Web based application for representation, management and sharing of IMS LIP conformant user profiles. The tool is developed using a service oriented architecture with emphasis on the easy data sharing. Data elicitation from user profiles is based on the utilization of XQuery scripts and sharing with other applications is achieved through…
Descriptors: Computer Oriented Programs, Information Management, Knowledge Management, Shared Resources and Services
National School Boards Association, 2014
The Cloud's presence in both personal and professional lives has happened so quickly. In fact, many of the educational tools employed by teachers and district offices operate through an Internet connection only. The advantages of Cloud-based platforms and learning tools are obvious--ease, convenience, 24/7 accessibility, less staff time…
Descriptors: Internet, Computer Software, Computers, Users (Information)
Goldsborough, Reid – Black Issues in Higher Education, 2004
What's the worst thing that can happen to your computer? Worse than a hard disk crash, virus infection, spam assault, denial-of-service attack, hacker take-over, fire, flood, or other human, mechanical or natural disaster is a faulty backup when you really need it. If the computer blows up, as long as your data is backed up securely, you can…
Descriptors: Computer Security, Computer Storage Devices, Computers, Internet
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers