Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
T.H.E. Journal | 4 |
Author
Gunay, Vedat | 1 |
Krueger, Keith R. | 1 |
Ozkan, Betul C. | 1 |
Walery, Darrell | 1 |
Waters, John K. | 1 |
Williams, Cheryl S. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Opinion Papers | 1 |
Education Level
Audience
Practitioners | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security

Walery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security

Ozkan, Betul C.; Gunay, Vedat – T.H.E. Journal, 2004
Emerging technologies are quickly becoming part of daily learning and teaching endeavors in academia. Due to the access to certain high-tech tools educators must learn how to integrate these tools in educational settings. However, many also encounter problems and weaknesses in the same high-tech environment that uses and delivers information…
Descriptors: Viruses, Computer Security, Higher Education, Computer Networks
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts