Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 38 |
Descriptor
Computer Networks | 106 |
School Districts | 106 |
Elementary Secondary Education | 69 |
Educational Technology | 46 |
Computer Uses in Education | 42 |
Internet | 27 |
Telecommunications | 26 |
Computer Software | 21 |
Public Schools | 20 |
Computer Security | 15 |
Information Technology | 15 |
More ▼ |
Source
Author
Black, Libby | 2 |
Dessoff, Alan | 2 |
Henderson, David L. | 2 |
Renfrow, Raylene | 2 |
Schaffhauser, Dian | 2 |
Stahlhut, Richard | 2 |
Tusch, Erich G. | 2 |
Ahlgrim-Delzell, Lynn | 1 |
Alexander, Charles | 1 |
Arnold, Erik P. | 1 |
Bacak, Julie | 1 |
More ▼ |
Publication Type
Education Level
Elementary Secondary Education | 24 |
High Schools | 5 |
Secondary Education | 5 |
Elementary Education | 4 |
Junior High Schools | 2 |
Postsecondary Education | 2 |
Adult Education | 1 |
Intermediate Grades | 1 |
Middle Schools | 1 |
Two Year Colleges | 1 |
Location
Texas | 8 |
California | 7 |
Minnesota | 4 |
Canada | 3 |
New York | 3 |
Arizona | 2 |
Colorado | 2 |
Iowa | 2 |
New Jersey | 2 |
Oregon | 2 |
United States | 2 |
More ▼ |
Laws, Policies, & Programs
Fair Labor Standards Act | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Martin, Florence; Bacak, Julie; Byker, Erik Jon; Wang, Weichao; Wagner, Jonathan; Ahlgrim-Delzell, Lynn – Journal of Cybersecurity Education, Research and Practice, 2023
With the growth in digital teaching and learning, there has been a sharp rise in the number of cybersecurity attacks on K-12 school networks. This has demonstrated a need for security technologies and cybersecurity education. This study examined security technologies used, effective security practices, challenges, concerns, and wish list of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
State Educational Technology Directors Association, 2019
Since 1993, at the regional level, the Minnesota Education Technology Networks (METN), a cooperative of regional networks, provides regional network development, support and leadership to Minnesota school districts. METN member cooperatives provide network coordination, procurement, and other support to help school districts acquire and manage…
Descriptors: Elementary Secondary Education, Educational Technology, Internet, Access to Computers
State Educational Technology Directors Association, 2019
Connecticut is committed to ensuring scalable, high-performance, cost-efficient broadband to its public schools and libraries. The Connecticut Commission for Educational Technology (Commission), created in 2000, serves as the educational technology advisor to schools, libraries, and institutions of higher education and started with a mission to…
Descriptors: Elementary Secondary Education, Educational Technology, Internet, Access to Computers
State Educational Technology Directors Association, 2019
The 1990 Kentucky Education Reform Act (KERA) created the Kentucky Education Technology System (KETS) authorizing the Office of Education Technology (OET) within the Kentucky Department of Education (KDE) to provide internet access to all school districts. One of the key components included in the legislation was the development of a technology…
Descriptors: Elementary Secondary Education, Educational Technology, Internet, Access to Computers
Alexander, Charles – ProQuest LLC, 2018
Encryption based ransomware operates by iterating through all files with specific extensions on the computer and mutating them into an unusable form. The mutation, in many cases, can only be reversed if the user pays the operator of the ransomware a fee to get their files back. K-12 school districts have fallen victim to rampant malware as a…
Descriptors: Computer Security, School Districts, Elementary Secondary Education, Computer Uses in Education
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
Schools (public and nonpublic) and school districts face a myriad of challenging hazards and threats. In addition to natural hazards, technological hazards, and biological hazards, they now have to prepare for human-caused cyber threats. These incidents can be accidental or deliberate and disrupt education and critical operations; expose sensitive…
Descriptors: Computer Security, Information Security, Elementary Schools, Secondary Schools
Hashim, Ayesha K. – Journal of Education Finance, 2022
Internet connectivity has become a critical resource for teaching and learning. The Common Core State Standards (CCSS) is a prime example, with schools expected to implement online assessments and use online resources for instruction. Yet there is little known about the extent to which local education agencies (LEAs) and schools are taking…
Descriptors: Common Core State Standards, Computer Assisted Testing, Longitudinal Studies, School Districts
Office of Educational Technology, US Department of Education, 2017
This guide provides practical, actionable information intended to help both technical personnel and educational leaders navigate the many decisions required to deliver broadband connectivity to students. It presents a variety of options for school and district leaders to consider when making technology infrastructure decisions, recognizing that…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, School Districts
Bakia, Marianne – Office of Educational Technology, US Department of Education, 2014
To provide students with the education they need to thrive in a globally connected world, schools and school districts need to find ways to design, fund, acquire, and maintain the infrastructure that will make connectivity a reality for every teacher and student in every classroom. The U.S. Department of Education's National Educational Technology…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, Internet
Arnold, Erik P. – ProQuest LLC, 2014
A multiple-case qualitative study of five school districts that had implemented various large-scale technology initiatives was conducted to describe what superintendents do to gain acceptance of those initiatives. The large-scale technology initiatives in the five participating districts included 1:1 District-Provided Device laptop and tablet…
Descriptors: Superintendents, Case Studies, Qualitative Research, School Districts
Gao, Niu – Public Policy Institute of California, 2015
In addition to the Common Core State Standards (CCSS), California is implementing a new, online assessment system: the California Assessment of Student Performance and Progress (CAASPP). Field tests were conducted last spring and the system is being rolled out this year, amid concerns about whether schools are technologically prepared. Using…
Descriptors: Online Courses, Educational Technology, Computer Assisted Testing, Technology Uses in Education
Schaffhauser, Dian – T.H.E. Journal, 2011
Setting up a wireless network is easy enough. Place a few access points in strategic areas, then watch the network traffic fly! That approach may hold up reasonably well for a few dozen users, but there's no way it would support a schoolwide 1-to-1 program. Once students take to it with their wireless devices, "they're going to kill it,"…
Descriptors: Computer Networks, Telecommunications, Reliability, Handheld Devices
Tusch, Erich G. – Education Digest: Essential Readings Condensed for Quick Review, 2012
In 2004, prior to the launch of their 1-to-1 laptop program, the superintendent expressed some anxiety about the prospect of radically changing teaching and learning by issuing a laptop computer to every student and teacher. Although the concept was exciting, it carried big risks and would take time and thorough planning to execute well. Even with…
Descriptors: Computer Networks, Educational Technology, Public Support, Computer Uses in Education