Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 14 |
Descriptor
Computer Networks | 41 |
Privacy | 41 |
Information Networks | 16 |
Computer Security | 15 |
Higher Education | 15 |
Internet | 13 |
Access to Information | 11 |
Information Technology | 11 |
Ethics | 8 |
Government Role | 7 |
Telecommunications | 7 |
More ▼ |
Source
Author
Panettieri, Joseph C. | 2 |
Ainsworth, Shaaron | 1 |
Almeroth, Kevin | 1 |
Anderson, Sharolyn | 1 |
Ben-Jacob, Marion G. | 1 |
Bristow, Rob | 1 |
Buda, Marie | 1 |
Connolly, Mary V. | 1 |
Crook, Charles | 1 |
Daugherty, Michael K. | 1 |
Dern, Daniel P. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 41 |
Journal Articles | 37 |
Opinion Papers | 15 |
Speeches/Meeting Papers | 3 |
Guides - General | 2 |
Information Analyses | 2 |
Book/Product Reviews | 1 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 9 |
Elementary Secondary Education | 2 |
Postsecondary Education | 2 |
Secondary Education | 1 |
Two Year Colleges | 1 |
Location
Canada | 2 |
Massachusetts | 2 |
Ohio | 2 |
United Kingdom | 2 |
United States | 2 |
Arkansas | 1 |
Australia | 1 |
Connecticut | 1 |
Georgia | 1 |
Indiana | 1 |
Netherlands | 1 |
More ▼ |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
First Amendment | 1 |
Freedom of Information Act | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Ben-Jacob, Marion G. – Journal of Educational Technology Systems, 2017
This article deliberates concepts of Internet ethics from the perspectives of user and providers. It discusses concerns of the users from different disciplines. It addresses issues and corresponding regulations of service providers. It considers matters of privacy. The culmination is an exercise for students that incorporates usage of the Internet…
Descriptors: Internet, Ethics, Privacy, Computer Networks
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Almeroth, Kevin; Zhang, Hangjin – Journal of Interactive Learning Research, 2013
With the advent of laptop computers and network technology, many classrooms are now being equipped with Internet connections, either through wired connections or wireless infrastructure. Internet access provides students an additional source from which to obtain course-related information. However, constant access to the Internet can be a…
Descriptors: Internet, Laptop Computers, Information Technology, Student Behavior
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Ainsworth, Shaaron; Gelmini-Hornsby, Giulia; Threapleton, Kate; Crook, Charles; O'Malley, Claire; Buda, Marie – Learning and Instruction, 2011
The advent of networked environments into the classroom is changing classroom debates in many ways. This article addresses one key attribute of these environments, namely anonymity, to explore its consequences for co-present adolescents anonymous, by virtue of the computer system, to peers not to teachers. Three studies with 16-17 year-olds used a…
Descriptors: Voting, Debate, Classroom Environment, Computer Networks
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology

Jones, Robert Alun – Internet Research, 1994
Notes that research on the use of networked information resources, like any kind of social science involving the study of human subjects, raises ethical questions. The tension between traditional research guidelines and new technologies is discussed; public/private distinctions and informed consent are addressed; and possible solutions are…
Descriptors: Computer Networks, Definitions, Ethics, Guidelines
Ekhaml, Leticia – School Library Media Activities Monthly, 2001
Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Electronic Mail
Mills, Lane B. – School Administrator, 2004
School district networks are particularly difficult to protect given the diverse types of users, software, equipment and connections that most school districts provide. Vulnerabilities to the security of school district's technology infrastructure can relate to users, data, software, hardware and transmission. This article discusses different…
Descriptors: Educational Technology, School Districts, Computer Security, Privacy
Smoot, Oliver – EDUCOM Review, 1994
Examines the relationship between the National Information Infrastructure (NII) and the new General Agreement on Tariffs and Trade. Topics discussed include the reduction or elimination of tariffs on NII products; protection of copyrighted works; unresolved trade issues, including the European telecommunications market; standards; and privacy and…
Descriptors: Computer Networks, Copyrights, Foreign Countries, Information Networks