Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 11 |
Descriptor
Source
Author
Publication Type
Education Level
Elementary Secondary Education | 6 |
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Practitioners | 12 |
Administrators | 11 |
Policymakers | 3 |
Teachers | 3 |
Media Staff | 2 |
Parents | 2 |
Community | 1 |
Students | 1 |
Support Staff | 1 |
Location
Canada | 3 |
Indiana | 1 |
Maine | 1 |
Maryland | 1 |
Massachusetts (Cambridge) | 1 |
Ohio | 1 |
Virginia | 1 |
Washington | 1 |
West Virginia | 1 |
Wisconsin | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Individuals with Disabilities… | 2 |
Coronavirus Aid Relief and… | 1 |
Every Student Succeeds Act… | 1 |
National School Lunch Act 1946 | 1 |
Student Right to Know and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Office of Educational Technology, US Department of Education, 2024
Today and in the future, a growing array of Artificial Intelligence (AI) models and capabilities will be incorporated into the products that specifically serve educational settings. The U.S. Department of Education (Department) is committed to encouraging innovative advances in educational technology (edtech) to improve teaching and learning…
Descriptors: Artificial Intelligence, Computer Uses in Education, Educational Technology, Ethics
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
National Forum on Education Statistics, 2022
Digital inequity has been a long-standing issue in the education community. A lack of home internet and technology devices can not only hinder students' ability to access educational resources at home, but can also have a detrimental effect on student achievement. Education agencies have taken steps over the past decades to address digital…
Descriptors: Access to Computers, Technology Uses in Education, Educational Technology, Internet
Office of Educational Technology, US Department of Education, 2017
This guide provides practical, actionable information intended to help both technical personnel and educational leaders navigate the many decisions required to deliver broadband connectivity to students. It presents a variety of options for school and district leaders to consider when making technology infrastructure decisions, recognizing that…
Descriptors: Educational Technology, Technology Uses in Education, Technology Integration, School Districts
US Department of Homeland Security, 2013
The "Stop.Think.Connect. Community Outreach Toolkit" was adapted from the Federal Trade Commission's "OnGuardOnline.gov," a project that provides practical tips to help guard against Internet fraud and protect your privacy. The kit will help you offer your community information about protecting kids online. It includes "Stop.Think.Connect.," a…
Descriptors: Internet, Computer Security, Computer Mediated Communication, Guides
Walk This Way: Detailed Steps for Transferring Born-Digital Content from Media You Can Read In-House
Barrera-Gomez, Julianna; Erway, Ricky – OCLC Online Computer Library Center, Inc., 2013
This document is a companion to the report, "You've Got to Walk before You Can Run: First Steps for Managing Born-Digital Content Received on Physical Media." Like the "First Steps" report, the intended audience is those who are just starting to manage born-digital materials, from those wondering where to begin, to those who…
Descriptors: Archives, Electronic Publishing, Documentation, Computer Software
National Forum on Education Statistics, 2011
This document, "Book Three of Four: Effectively Managing LDS Data," is the third installment of this Forum series of guides on longitudinal data systems (LDS). This third book in the guide series discusses organizational issues aimed at moving the project forward and ensuring that the data are of high quality so that users may leverage…
Descriptors: Information Systems, Information Management, Data, Organization
Consortium for School Networking (NJ1), 2011
Web 2.0 applications and mobile Internet devices have added new issues to the safety/access situation for schools. The purpose of this guide is to assist school districts in developing, rethinking, or revising Internet policies as a consequence of the emergence of Web 2.0, and the growing pervasiveness of smart phone use. The Consortium for School…
Descriptors: Safety, Laws, School Districts, Internet
Alberta Education, 2012
Education leaders are re-examining acceptable use policies in light of the increasing use of highly mobile information technologies. While acceptable use policies were developed to manage and control behaviour, a digital citizenship policy takes a more comprehensive approach by recognizing the important role of education in preparing digital…
Descriptors: Guides, Foreign Countries, Policy Formation, School Policy
Adler, M. Peter – EDUCAUSE Review, 2006
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Descriptors: Higher Education, Publicity, Computer Security, Colleges
Saye, Lee – School Planning and Management, 1997
Schools can protect themselves against massive loss of computer data by taking action. Lists steps to plan a disaster recovery program, focus efforts to install it, and see that all bases are covered when it is in place. (MLF)
Descriptors: Computer Security, Elementary Secondary Education, Emergency Programs
Gosmire, Doreen; Grady, Marilyn L. – Principal Leadership, 2007
Technology expenditures and usage in schools have risen by nearly 300 percent during the last three decades. Few principals claim to be technology experts, but most aspire to design a map that leads their schools to success with educational technology. The key to success on the journey is not to know everything, but to ask the right questions.…
Descriptors: Principals, Educational Technology, Technology Integration, Educational Trends
Shermis, Mark D.; Averitt, Jason – 2001
The purpose of this paper is to enumerate a series of security steps that might be taken by those researchers or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations here…
Descriptors: Computer Assisted Testing, Computer Security, Performance Based Assessment, Testing Problems
Patterson, Kristin – American School Board Journal, 1996
Property theft at schools is a problem districts are having to confront. Deterrents include inventory checks and etching equipment with inventory control numbers. In Washington, D.C., officials are installing high-security equipment such as closed-circuit television, fiber-optics lines to secure computers, and motion detectors. (MLF)
Descriptors: Alarm Systems, Computer Security, Cost Effectiveness, Crime Prevention
Williams, Robert L. – 2001
This manual is intended to provide a free resource on essential network security concepts for non-technical managers of small libraries. Managers of other small nonprofit or community organizations will also benefit from it. An introduction defines network security; outlines three goals of network security; discusses why a library should be…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration