Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Publication Type
Journal Articles | 2 |
Reports - Research | 2 |
Guides - Non-Classroom | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Descriptive | 1 |
Education Level
Elementary Secondary Education | 2 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Policymakers | 1 |
Practitioners | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hinchman, David B. – US Government Accountability Office, 2022
The COVID-19 pandemic forced schools across the nation to increase their reliance on IT to deliver educational instruction to students. This amplified the vulnerability of K-12 schools to potentially serious cyberattacks. The US Government Accountability Office (GAO) was asked to review cybersecurity in K-12 schools. The objectives of this report…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Government Role
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy