NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 24 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2011
The need to maintain an unpolluted learning environment is no easy task for schools and districts that have incorporated social networking sites into their educational life. The staff and teachers at Blaine High School in Minnesota's Anoka-Hennepin District 11 had been considering the pros and cons of establishing a school Facebook page when the…
Descriptors: Social Networks, Web Sites, Educational Environment, High Schools
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2009
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Descriptors: Internet, School Districts, Computer Software, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2009
Since laptop programs extend instruction beyond the campus, it is then a must for schools to try a variety of solutions to protect their machines--and their users. Combining high-tech safeguards with face-to-face user education is a must for schools whose laptop programs allow students to take the computers off-site. For a cautionary tale on the…
Descriptors: Educational Technology, Laptop Computers, Access to Computers, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Sturgeon, Julie – T.H.E. Journal, 2008
Acting on information from students who reported seeing a classmate looking at inappropriate material on a school computer, school officials used forensics software to plunge the depths of the PC's hard drive, searching for evidence of improper activity. Images were found in a deleted Internet Explorer cache as well as deleted file space.…
Descriptors: Computer Software, Computers, Internet, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Villano, Matt – T.H.E. Journal, 2008
The Children's Internet Protection Act (CIPA) requires any school or library receiving funding from the federal E-Rate program to deploy web filtering technology to prevent users from viewing objectionable material while they are using the institution's computers. However, opponents of web filtering legislation question whether or not mandated…
Descriptors: Internet, Web Sites, Computer Security, Computer Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Villano, Matt – T.H.E. Journal, 2008
With K-12 students seeming to, at all times, have one foot in the real world and one in the virtual, school districts are starting to acknowledge a new collective responsibility: to teach kids what it means to be a good digital citizen and how to go about being one. The movement to address and characterize digital citizenship originated in the UK,…
Descriptors: Citizenship, Elementary Secondary Education, Educational Technology, Internet
Peer reviewed Peer reviewed
Martin, Kelly – T.H.E. Journal, 2004
It used to be that Internet threats were aimed at disabling their targets. The most common payload of yesterday's viruses, worms and other malicious code either caused system instability or, perhaps, deleted certain files. In many cases, these threats announced their arrival by flashing messages on the computer screen or causing some other…
Descriptors: Computer Security, Computer Software, Privacy, Internet
Peer reviewed Peer reviewed
Lambert, Joyce C.; Lousteau, Carolyn L.; Mochetta, Page T. – T.H.E. Journal, 2001
Discusses the security of computerized test files based on a survey of collegiate educators and offers recommendations to make tests more secure. Highlights include passwords; firewalls; keeping test files offline rather than on a hard drive; encryption; and using software to write over files rather than just deleting them. (LRW)
Descriptors: Computer Security, Computer Software, Higher Education, Surveys
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
Peer reviewed Peer reviewed
Hinojosa, Patrick – T.H.E. Journal, 2005
Information security management consists of identifying an organization's electronic informational assets, as well as the planning and programs that must be carried out to ensure its continued availability, confidentiality and integrity. Whether the organization is a commercial enterprise, governmental agency or educational institution, these…
Descriptors: Confidentiality, Integrity, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2008
As technology grows more pervasive in education, the data recovery issues that school systems encounter are becoming increasingly problematic, as districts work to accommodate a range of concerns that do not encumber commercial businesses. State and federal laws often require schools to report on student populations and educational progress…
Descriptors: Elementary Secondary Education, Educational Technology, Computer Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Walery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security
Previous Page | Next Page ยป
Pages: 1  |  2