Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 7 |
Descriptor
Source
Author
Adusei-Poku, Adjoa | 1 |
Akins, M. L. | 1 |
Beuran, Razvan | 1 |
Carlin, Anna | 1 |
Cradler, John | 1 |
Flamer, Eric | 1 |
Fryer, Wesley A. | 1 |
Griffin, J. R. | 1 |
Hasegawa, Shinobu | 1 |
Howell, Ashley | 1 |
Jiang, Weiwei | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 11 |
Journal Articles | 7 |
Opinion Papers | 2 |
Education Level
Elementary Secondary Education | 2 |
Adult Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Support Staff | 1 |
Teachers | 1 |
Location
Australia | 1 |
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2024
Cybersecurity remains a critical concern for school systems nationwide, showing a consistent increase in publicly disclosed K-12 cyber incidents over the past 5 years. The U.S. Department of Homeland Security's 2024 Homeland Threat Assessment underscores this trend, predicting ongoing targeting of K-12 school networks by cyber actors who will…
Descriptors: Computer Security, Information Security, Elementary Secondary Education, Prevention
Howell, Ashley – Advanced Distributed Learning Initiative, 2022
A federated Enterprise Learner Record Repository (ELRR) provides the ability to look across many distributed learner records as if they were from a single source and enables the sharing of local and global learner data across the DoD. This learner data will be pulled from authoritative sources for publishing, customizing, and harmonizing…
Descriptors: Student Records, Training, Computer Uses in Education, Computer Security
Tan, Zheyu; Beuran, Razvan; Hasegawa, Shinobu; Jiang, Weiwei; Zhao, Min; Tan, Yasuo – Education and Information Technologies, 2020
Cybersecurity is no longer an issue discussed only between the professionals or technologists, but it is also closely related to ordinary people whose daily life is exposed to kinds of cyberattacks. And Womabat Security Technologies conducted a survey revealed that ransomware is an unknown concept to nearly two-thirds of employees. In practical,…
Descriptors: Computer Security, Information Security, Training, Computer Assisted Instruction
Flamer, Eric; Adusei-Poku, Adjoa; Schafrik, Franki – Advanced Distributed Learning Initiative, 2021
The Enterprise Learner Record Repository (ELRR) System Architecture Report (SAR) outlines the ELRR solution architecture by describing the specification and deployment of hardware and software, interfaces, and port/protocol usage. This report focuses on the standards, specifications, services, and systems necessary to enable individual DoD…
Descriptors: Training, Government Employees, Military Personnel, Management Systems
Richardson, Michael D.; Lemoine, Pamela A.; Stephens, Walter E.; Waller, Robert E. – Educational Planning, 2020
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st century. Computer security is an essential instrument for protecting children, but K-12 schools are considered one of the most attractive targets for data privacy crimes often due to the less-than-effective cybersecurity practices in schools. The human…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Privacy
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
US Department of Homeland Security, 2009
The overarching goal of the National Infrastructure Protection Plan (NIPP) is to build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation's critical infrastructure and key resources (CIKR)…
Descriptors: National Security, Resources, Terrorism, Natural Disasters
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Akins, M. L.; Griffin, J. R. – Computers in Libraries, 1999
Presents the main ingredients for successful computer-systems administration. Discusses training and ongoing support, change management for system upgrades, developing a problem-reporting form and keeping the documentation history, managing technical support, and having a disaster-recovery plan. (AEF)
Descriptors: Administration, Change Strategies, Computer Oriented Programs, Computer Security

Massie, Malcom – Orana, 1996
Scotch College (Adelaide, Australia) has networked 90% of its classrooms. This article describes the campus computer network and its hardware and configuration; World Wide Web problems and solution; a "mini Internet" of curriculum-specific materials gathered from the Web; student and faculty use; student and staff training; security;…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology
Yrchik, John; Cradler, John – ED, Education at a Distance, 1994
Discusses guidelines that were developed to ensure that the National Information Infrastructure provides expanded opportunities for education and training. Topics include access requirements for homes and work places as well as schools; education and training application requirements, including coordination by federal departments and agencies; and…
Descriptors: Access to Computers, Access to Information, Computer Assisted Instruction, Computer Security