Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
Association Supporting… | 1 |
Innovations in Education and… | 1 |
Internet Research | 1 |
Library Journal | 1 |
Media & Methods | 1 |
T.H.E. Journal | 1 |
Author
Bleimann, Udo | 1 |
Karpisek, Marian | 1 |
Kim, Ann | 1 |
Lehrfeld, Michael R. | 1 |
Loew, Robert | 1 |
McDonald, Aidan | 1 |
Mudge, Stephen M. | 1 |
Stengel, Ingo | 1 |
Waters, John K. | 1 |
Publication Type
Reports - Descriptive | 6 |
Journal Articles | 5 |
Guides - Non-Classroom | 1 |
Reference Materials -… | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Elementary Secondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage

Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan – Internet Research, 1999
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Descriptors: Computer Networks, Computer Security, Information Retrieval, Local Area Networks
Kim, Ann – Library Journal, 2006
This article discusses the possible answers to most librarians' questions and how advanced and hi-technology help them in the library world. Many of the answers to librarians' questions regarding digital media depend upon community/patron awareness and library resources. In this article, the author presents some quoted statements from electronic…
Descriptors: Librarians, Library Services, Library Development, Information Retrieval

Mudge, Stephen M. – Innovations in Education and Training International, 1999
Discusses advantages and disadvantages of using the Internet for delivering teaching modules and makes recommendations for successful use of the Internet. Highlights include the availability of information at all times and from remote locations, multimedia capabilities, infrastructure needed, security issues, updating, needed skills, and…
Descriptors: Access to Information, Computer Assisted Instruction, Computer Literacy, Computer Security
Karpisek, Marian; And Others – Media & Methods, 1995
Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…
Descriptors: Computer Networks, Computer Security, Educational Media, Elementary Secondary Education