Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Source
American School Board Journal | 1 |
Journal of Information… | 1 |
School Business Affairs | 1 |
Technology, Pedagogy and… | 1 |
Author
Bailey, Gerald D. | 1 |
Clapper, Danial L. | 1 |
Ford, Janet C. | 1 |
Kovac, Ron J. | 1 |
Powell, Ken | 1 |
Pownell, David | 1 |
Russell, Terry | 1 |
White, Barbara Jo | 1 |
Wickens, Cathy | 1 |
Willey, Lorrie | 1 |
Woollard, John | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Evaluative | 4 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
Kovac, Ron J. – School Business Affairs, 1999
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Descriptors: Computer Security, Costs, Elementary Secondary Education, Guidelines
Pownell, David; Bailey, Gerald D. – American School Board Journal, 2001
Handheld computers are just beginning to be introduced in schools. Before adopting the latest innovation, administrators must ask careful questions about issues and implications regarding leadership, teaching and learning, staff development, technology support, planning, infrastructure, safety and security, ethics, evaluation, curriculum, change,…
Descriptors: Administrator Responsibility, Computer Security, Computer Uses in Education, Elementary Secondary Education