NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Equal Access1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 27 results Save | Export
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Project Tomorrow, 2021
Project Tomorrow's® annual Speak Up Research Project has documented the evolution of technology use, both from an instructional and operational perspective, within K-12 education since 2003. Since 2017, the Speak Up results have also included a focus on K-12 districts' cybersecurity preparations. However, today, the combination of the expansion of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cusak, Austin – Journal of Cybersecurity Education, Research and Practice, 2023
A qualitative case study focused on understanding what steps are needed to prepare the cybersecurity workforces of 2026-2028 to work with and against emerging technologies such as Artificial Intelligence and Machine Learning. Conducted through a workshop held in two parts at a cybersecurity education conference, findings came both from a…
Descriptors: Internet, Computer Security, Information Security, Labor Force Development
Frank Ciccitto – ProQuest LLC, 2023
The requirement that schools must monitor student internet use is not a new concept to K-12 education; however, the use of safety management platforms (SMPs) to help with this task is new. These tools utilize artificial intelligence to sift through the data attached to student information and communications technology (ICT) use and report it back…
Descriptors: Principals, Elementary Secondary Education, Discipline, Internet
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jim Belair; Nicole Waskie-Laura – Knowledge Quest, 2021
How can school librarians change the view of school librarians to better match the reality of their work? One way is to increase their explicit connections with broad, recognizable initiatives, like digital fluency and computer science. The The New York State Computer Science and Digital Fluency (CS/DF) Standards, in alignment with the "AASL…
Descriptors: School Libraries, Librarians, Role, Educational Technology
Fox, Christine; Cougan, Monica; Little, Rachel – State Educational Technology Directors Association, 2017
Providing access to robust connectivity is critical to ensuring today's students are college and career ready. As such, federal, state, and district-level leaders have dedicated a significant amount of time, effort, and resources toward improving our schools' external broadband access, including both Internet access and wide area network (WAN).…
Descriptors: Internet, Computer Networks, Educational Planning, Telecommunications
US Department of Education, 2018
The Department of Education Strategic Plan for Fiscal Years 2018-2022 describes the policy and operational priorities for the agency. The Plan details the Department's strategic goals and objectives over the next four years. The Plan also provides an overview of our Fiscal Year 2018-2019 Agency Priority Goals.
Descriptors: Strategic Planning, Educational Objectives, Elementary Secondary Education, Educational Improvement
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
White, Kerry-Ann – ProQuest LLC, 2012
Given the lack of computer diffusion studies in the Caribbean, and coupled with the necessity to understand Jamaica in efforts to get a clearer global representation of the digital divide, this study takes an exploratory approach and examines the differences of the computer technology adoption and diffusion attitudes and viewpoints between the…
Descriptors: Foreign Countries, Educational Technology, Information Technology, Technology Integration
Pearring, John – American School & University, 2012
The education sector remains abuzz with cost-cutting expectations despite pressures to increase services. Automation of costly manual tasks could save funds for many of these institutions, specifically in data protection. The IT departments of schools and universities can take advantage of a proven cost-savings opportunity in data protection that…
Descriptors: Educational Technology, Automation, Technological Advancement, Computer Security
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics
Previous Page | Next Page »
Pages: 1  |  2