Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
Technology & Learning | 4 |
Publication Type
Journal Articles | 4 |
Opinion Papers | 4 |
Reports - Descriptive | 2 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Svetcov, Eric – Technology & Learning, 2005
This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…
Descriptors: Costs, Computer Networks, Computer Security, Educational Technology
Fryer, Wesley – Technology & Learning, 2004
There has long been a power struggle between techies and teachers over classroom computer desktops. IT personnel tend to believe allowing "inept" educators to have unfettered access to their computer's hard drive is an open invitation for trouble. Conversely, teachers often perceive tech support to be "uncaring" adversaries standing in the way of…
Descriptors: Teachers, Educational Innovation, Computer Software, Computer Uses in Education