Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Foreign Countries | 3 |
Internet | 3 |
Computer Software | 2 |
Computer Uses in Education | 2 |
Policy Formation | 2 |
Social Networks | 2 |
Access to Computers | 1 |
Access to Information | 1 |
Behavior | 1 |
Check Lists | 1 |
More ▼ |
Author
Storey, Tom, Ed. | 1 |
Publication Type
Reports - Evaluative | 2 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Numerical/Quantitative Data | 1 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 1 |
Location
Canada | 3 |
France | 1 |
Germany | 1 |
Japan | 1 |
United Kingdom | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software