Descriptor
Publication Type
Journal Articles | 3 |
Opinion Papers | 3 |
Reports - Descriptive | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Oravec, Jo Ann – Business Education Forum, 2000
Risk management training cannot prevent hazards, but can help students learn to deal with them more efficiently. A risk-assessment and risk-communication approach to dealing with computer problems can be applied in the business classroom. (JOW)
Descriptors: Business Education, Computer Security, Risk Management, Training
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Yrchik, John; Cradler, John – ED, Education at a Distance, 1994
Discusses guidelines that were developed to ensure that the National Information Infrastructure provides expanded opportunities for education and training. Topics include access requirements for homes and work places as well as schools; education and training application requirements, including coordination by federal departments and agencies; and…
Descriptors: Access to Computers, Access to Information, Computer Assisted Instruction, Computer Security