Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Security | 9 |
Information Technology | 7 |
Computer Networks | 5 |
Educational Technology | 3 |
Elementary Secondary Education | 3 |
Higher Education | 3 |
Internet | 3 |
Privacy | 3 |
Campuses | 2 |
Certification | 2 |
College Students | 2 |
More ▼ |
Source
Campus Technology | 2 |
American Association of… | 1 |
Chronicle of Higher Education | 1 |
Foundation for Excellence in… | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
T.H.E. Journal | 1 |
Author
Gale, Doug | 1 |
Howard, Elizabeth V. | 1 |
Li, Chengcheng | 1 |
McDavis, Roderick J. | 1 |
Panettieri, Joseph C. | 1 |
Petro, Jim | 1 |
Ramaswami, Rama | 1 |
Woods, David M. | 1 |
Publication Type
Reports - Descriptive | 9 |
Journal Articles | 6 |
Education Level
Higher Education | 5 |
Elementary Secondary Education | 2 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
Ohio | 9 |
Washington | 3 |
Alabama | 2 |
Arizona | 2 |
Georgia | 2 |
Indiana | 2 |
Oklahoma | 2 |
South Carolina | 2 |
Arkansas | 1 |
Connecticut | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Foundation for Excellence in Education (ExcelinEd), 2014
A full year of progress in advancing education reform across America is documented in each of the Foundation for Excellence in Education's Annual Reports. The illustrated pages of the 2014 report, provide data-rich updates on Excellence in Education's work to advance student-centered policies in more than 40 states, all aimed at improving learning…
Descriptors: Educational Change, Educational Quality, Excellence in Education, Student Centered Learning
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Ramaswami, Rama – T.H.E. Journal, 2008
As technology grows more pervasive in education, the data recovery issues that school systems encounter are becoming increasingly problematic, as districts work to accommodate a range of concerns that do not encumber commercial businesses. State and federal laws often require schools to report on student populations and educational progress…
Descriptors: Elementary Secondary Education, Educational Technology, Computer Uses in Education, Technology Integration
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Petro, Jim – 1999
Survey data obtained in recent audits updated Ohio's local government units' assessment of Year 2000 (Y2K) readiness. The survey was developed with three intended objectives: (1) to provide an accurate assessment of the efforts to remediate the Y2K problem in Ohio's school districts, cities and counties; (2) to identify issues that could affect…
Descriptors: City Government, Computer Security, Counties, Elementary Secondary Education
American Association of Community Colleges (NJ1), 2006
This publication includes 13 articles: (1) ATE [Advanced Technological Education] Attuned to Global Competition; (2) Materials Science Center Supplies Information on Often-Overlooked Field; (3) CSEC [Cyber Security Education Consortium] Builds Corps of Cyber Technicians; (4) KCTCS [Kentucky Community and Technical College System] Is U.S. Partner…
Descriptors: Technology Education, Technical Education, Community Colleges, Faculty Development