Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 6 |
Descriptor
Source
Author
Fisher, Mark A. | 2 |
Abbott, Robert | 1 |
Actis, Bev | 1 |
Adams Becker, S. | 1 |
Ahlgrim-Delzell, Lynn | 1 |
Ayer, Catriona, Ed. | 1 |
Bacak, Julie | 1 |
Bakia, Marianne | 1 |
Bakke, Thomas W. | 1 |
Bensen, Mary Brandt | 1 |
Berge, Zane L., Ed. | 1 |
More ▼ |
Publication Type
Education Level
Elementary Secondary Education | 4 |
Higher Education | 4 |
Two Year Colleges | 1 |
Audience
Administrators | 148 |
Practitioners | 136 |
Teachers | 32 |
Media Staff | 13 |
Policymakers | 13 |
Researchers | 7 |
Parents | 1 |
Students | 1 |
Location
United Kingdom | 3 |
Canada | 2 |
China | 2 |
New Jersey | 2 |
New York | 2 |
Australia | 1 |
Brazil | 1 |
California | 1 |
Croatia | 1 |
District of Columbia | 1 |
France | 1 |
More ▼ |
Laws, Policies, & Programs
Copyright Law 1976 | 1 |
Higher Education Act Title II | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Office of Educational Technology, US Department of Education, 2017
This guide provides practical, actionable information intended to help both technical personnel and educational leaders navigate the many decisions required to deliver broadband connectivity to students. It presents a variety of options for school and district leaders to consider when making technology infrastructure decisions, recognizing that…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, School Districts
Bakia, Marianne – Office of Educational Technology, US Department of Education, 2014
To provide students with the education they need to thrive in a globally connected world, schools and school districts need to find ways to design, fund, acquire, and maintain the infrastructure that will make connectivity a reality for every teacher and student in every classroom. The U.S. Department of Education's National Educational Technology…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, Internet
Johnson, L.; Adams Becker, S.; Cummins, M.; Estrada, V.; Meira, A. – New Media Consortium, 2012
This report reflects a collaborative research effort to help inform Brazilian educational leaders about significant developments in technologies supporting teaching, learning, and creative inquiry in primary and secondary education. In an effort that ran from August through October 2012, a carefully selected group of 30 experts considered hundreds…
Descriptors: Foreign Countries, Elementary Secondary Education, Educational Technology, Technology Uses in Education
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
Mills, Lane B. – School Administrator, 2004
School district networks are particularly difficult to protect given the diverse types of users, software, equipment and connections that most school districts provide. Vulnerabilities to the security of school district's technology infrastructure can relate to users, data, software, hardware and transmission. This article discusses different…
Descriptors: Educational Technology, School Districts, Computer Security, Privacy
Lasek, Alicia – School Planning and Management, 1997
Steady technology growth has allowed a Massachusetts school district to build a large, centralized database; improve a vast array of standard administrative operations; and design software applications tailored to many special needs. (MLF)
Descriptors: Computer Networks, Computer Uses in Education, Databases, Elementary Secondary Education
Woodbeck, Dean – Currents, 1995
As a college alumni organization designs a World Wide Web site for communication, it should consider why it is creating the site; features that will appeal to its audience; the effort it will take to keep information timely; adding to the site's value by offering useful, interesting information not available anywhere else; and touring other sites…
Descriptors: Alumni, Audience Awareness, College Administration, Computer Networks
Bensen, Mary Brandt – School Business Affairs, 1995
Schools' involvement in wide-area networks is increasing the need for copyright education for faculty and students. Copyright compliance policies and procedures should be developed along with proper supervision of school activities that have the potential to result in possible copyright violations. (MLF)
Descriptors: Compliance (Legal), Computer Networks, Copyrights, Elementary Secondary Education
Updegrove, Daniel A.; And Others – EDUCOM Review, 1990
Describes what electronic mail is, how it works, and suggests how it can be used by university administrators. National and international academic networks are described, institutional costs of network memberships are discussed, and procedures for connecting to a network and for using a network are explained. (13 references) (LRW)
Descriptors: Administrators, Computer Networks, Computer Software, Costs
Fisher, Mark A. – Currents, 1995
Several ways in which colleges and universities without direct access to the Internet can make use of its services are offered, including establishing an account with a commercial vendor, using inexpensive local providers, and connecting through nearby campuses. (MSE)
Descriptors: Access to Information, Computer Networks, Costs, Higher Education
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Rice, James – American Libraries, 1987
Describes the advantages of the development of open systems, i.e., a configuration which combines software and hardware from separate vendors into a single system, as a means of increasing the possible applications of library automation. (CLB)
Descriptors: Bibliographic Utilities, Computer Networks, Electronic Equipment, Library Automation