Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 16 |
Descriptor
Computer Security | 33 |
Electronic Mail | 33 |
Internet | 16 |
Computer Software | 10 |
Educational Technology | 9 |
Computer Networks | 7 |
Computers | 7 |
Information Technology | 7 |
Computer Mediated… | 6 |
Computer Uses in Education | 6 |
Privacy | 6 |
More ▼ |
Source
Author
Goldsborough, Reid | 2 |
Johnson, Doug | 2 |
Beach, Richard | 1 |
Beaudet, Michael | 1 |
Boeser, Elizabeth | 1 |
Bosley, Sara | 1 |
Brown, Abbie | 1 |
Brydolf, Carol | 1 |
Buck, Stephanie | 1 |
Cole, Timothy W. | 1 |
Crispen, Patrick Douglas | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 33 |
Journal Articles | 31 |
Opinion Papers | 2 |
Books | 1 |
Guides - Classroom - Teacher | 1 |
Education Level
Higher Education | 5 |
Elementary Secondary Education | 3 |
Adult Education | 1 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Administrators | 1 |
Teachers | 1 |
Location
Florida | 2 |
Indiana | 1 |
Kentucky | 1 |
Massachusetts | 1 |
Montana | 1 |
New Jersey | 1 |
New Mexico | 1 |
New York | 1 |
Oregon | 1 |
United Kingdom | 1 |
Wyoming | 1 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Hendrickson, Peggy Bell – College and University, 2021
This article is the second of a two-part series on best practices in receiving digital documents. Part I focused on national databases, third-party digital repositories, institutional websites, and certified documents. Part II looks at a problematic and prevalent of digital records options: email attachments. It discusses the security of email and…
Descriptors: Electronic Mail, Computer Security, Computer Uses in Education, Information Management
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Doerr-Stevens, Candance; Beach, Richard; Boeser, Elizabeth – English Journal, 2011
This article discusses how students use online role-play to collaborate and change real school policy. Playing different characters in an online role-play, students explore controversial aspects of Internet filtering and adopt a plan to change their school's policy. Through engaging in collaborative argumentation during their role-play, students…
Descriptors: Online Courses, Peer Groups, School Policy, Role Playing
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Dessoff, Alan – Education Digest: Essential Readings Condensed for Quick Review, 2010
Until this year, the Oregon Department of Education ran a central portal of thousands of learning resources that required all teachers and students to have an email address as authentication for security purposes. Because many districts didn't offer student email, the learning materials were not available to everyone. In April, Oregon became the…
Descriptors: Internet, State Departments of Education, Electronic Mail, Systems Approach
Ross, Derek G. – Journal of Technical Writing and Communication, 2009
Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters--modern perversions of "ars dictaminis" (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the…
Descriptors: Letters (Correspondence), Rhetoric, Rhetorical Criticism, Electronic Mail
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Technology & Learning, 2008
In this article, four directors discuss the security challenges that keep them worried and what they do about it. Dwayne Alton describes how his school district, IT School District of Lee County, Fort Meyers, Florida, collaborated with Cisco and installed an intrusion detection system which alerts IT staff when someone creates their own access…
Descriptors: Computer Security, School Districts, Information Technology, Computer Software
Bosley, Sara – Adults Learning, 2011
Everyone knows that lack of internet access can reinforce the social and economic disadvantages already facing some older people. Recognising the divisive nature of digital exclusion, the government has invested 2.8 million British Pounds in Get Digital, a project that will enable sheltered housing residents to develop computer and internet…
Descriptors: Focus Groups, Computers, Housing, Educational Technology
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Crispen, Patrick Douglas – Library Talk, 2000
Provides rules for protecting computers from viruses, Trojan horses, or worms. Topics include purchasing commercial antivirus programs and keeping them updated; updating virus definitions weekly; precautions before opening attached files; macro virus protection in Microsoft Word; and precautions with executable files. (LRW)
Descriptors: Computer Security, Computers, Electronic Mail

Goldsborough, Reid – Teacher Librarian, 2005
Many people still have not heard about the many ways identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. The tricksters are getting trickier. One of the newest scares involves…
Descriptors: Internet, Deception, Computer Security, Crime