Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 52 |
| Since 2017 (last 10 years) | 104 |
| Since 2007 (last 20 years) | 344 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Goldsborough, Reid | 6 |
| Panettieri, Joseph C. | 6 |
| Foster, Andrea L. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| Young, Jeffrey R. | 4 |
| Carlson, Scott | 3 |
| Carnevale, Dan | 3 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 16 |
| Practitioners | 15 |
| Media Staff | 14 |
| Administrators | 11 |
| Parents | 9 |
| Students | 6 |
| Policymakers | 5 |
| Support Staff | 2 |
| Community | 1 |
| Counselors | 1 |
Location
| California | 12 |
| Massachusetts | 11 |
| Maryland | 9 |
| Ohio | 9 |
| Canada | 8 |
| New York | 8 |
| North Carolina | 8 |
| Texas | 8 |
| United States | 7 |
| United Kingdom | 6 |
| Alabama | 5 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Trends in International… | 1 |
What Works Clearinghouse Rating
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment
Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.
Telecommunications Policy Research Conference, Inc., Washington, DC. – 1987
In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…
Descriptors: Access to Information, Banking, Computer Security, Cryptography
Harrison, J. Phil – Business Officer, 1996
A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…
Descriptors: Alarm Systems, College Administration, Computer Security, Computers
Neray, Phil – Online Libraries and Microcomputers, 1997
Discusses Internet access and monitoring in light of H. G. Wells' idea of a world brain or encyclopedia, or mind of the species. Topics include the evolution and effects of Internet access, including employee productivity, network bandwidth, and legal liabilities or negative publicity; and Internet usage and security policy. (LRW)
Descriptors: Access to Computers, Access to Information, Computer Security, Internet
Wanat, Thomas – Chronicle of Higher Education, 1997
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Descriptors: College Students, Computer Science, Computer Security, Crime
Peer reviewedTebbetts, Diane R. – Journal of Library Administration, 1999
Provides a framework for examining the complex infrastructure needed to successfully implement a digital library. Highlights include database development, online public-access catalogs, interactive technical services, full-text documents, hardware and wiring, licensing, access, and security issues. (Author/LRW)
Descriptors: Access to Information, Computer Security, Electronic Libraries, Full Text Databases
Peer reviewedGonzalez, Pedro – Microform and Imaging Review, 1999
Discusses the digital-image storage system at the Archivo General de Indias (Seville) that was developed to conserve original documents and to provide optimal access by researchers. Highlights include image quality, storage medium, computer equipment, remote access, security problems, problems of intellectual property and document ownership,…
Descriptors: Access to Information, Administration, Automation, Computer Security
Harrison, Warren – Journal on Educational Resources in Computing, 2006
The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…
Descriptors: Computer Security, Computer System Design, Evidence, Crime
Henderson, Dave – Technology & Learning, 2005
Providing quality technical support in K-12 environments can be challenging. Unlike the business world, there is generally a less-than-ideal ratio of technical staff to computers, numerous software titles from dozens of vendors, and of course--a much smaller budget. The Victor Central School District in Victor, New York, has employed a number of…
Descriptors: Computer Uses in Education, Technical Assistance, Elementary Secondary Education, Computer Software
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts
Kremer, John F. – New Directions for Teaching and Learning, 2004
Can computers help with one of the most persistent challenges of large classes: the accurate and efficient measurement of student learning?
Descriptors: Computer Assisted Testing, Computer Security, Case Studies, Instructional Design
Dewey, Barbara I.; DeBlois, Peter B. – EDUCAUSE Review, 2006
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2005 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Information Technology, Surveys, Annual Reports, Strategic Planning
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses and health office employees are the creators and caretakers of legal documentation. School nurses have an ethical and legal obligation to protect the integrity of electronic student health records. Although there are many threats to data integrity, from inadequate hardware to electrical surges, one of the most pervasive threats to…
Descriptors: School Nurses, Computer Security, School Health Services, Confidential Records
Gamble, Cheryl – Community College Journal, 2005
The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…
Descriptors: Technological Advancement, National Security, Security (Psychology), Computer Security
Bennett, Cedric – EDUCAUSE Quarterly, 2004
The Internet is a remarkable tool and change agent that has been successfully leveraged by colleges and universities to support, enhance, and extend the teaching/learning process; the creation of new knowledge through research; and the increasingly complex business of managing and administrating institutions. Although it supports and even creates…
Descriptors: State Legislation, Change Agents, Computer Security, Resource Allocation

Direct link
