Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 6 |
Computer Security | 6 |
Costs | 6 |
Information Technology | 4 |
Prevention | 3 |
Crime | 2 |
Decision Making | 2 |
Information Security | 2 |
Internet | 2 |
Access to Information | 1 |
Accountability | 1 |
More ▼ |
Author
Dark, Melissa | 1 |
Howe, Grant | 1 |
Lederer, Karen | 1 |
Poftak, Amy | 1 |
Rene Ekoteson | 1 |
Svetcov, Eric | 1 |
White, Jautau Kelton | 1 |
Publication Type
Dissertations/Theses -… | 3 |
Journal Articles | 3 |
Reports - Descriptive | 3 |
Opinion Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Lederer, Karen – ProQuest LLC, 2012
The purpose of this quantitative study was to investigate six factors that may influence adoption of virtual private network (VPN) technologies in small businesses with fewer than 100 employees. Prior research indicated small businesses employing fewer than 100 workers do not adopt VPN technology at the same rate as larger competitors, and the…
Descriptors: Small Businesses, Technology Integration, Computer Networks, Information Technology
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Svetcov, Eric – Technology & Learning, 2005
This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…
Descriptors: Costs, Computer Networks, Computer Security, Educational Technology
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks