Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Administrator Responsibility | 5 |
Computer Security | 5 |
College Administration | 2 |
Computer Networks | 2 |
Educational Policy | 2 |
Educational Technology | 2 |
Guidelines | 2 |
Higher Education | 2 |
Privacy | 2 |
Risk | 2 |
Risk Management | 2 |
More ▼ |
Source
American School Board Journal | 1 |
EDUCAUSE Quarterly | 1 |
Middle School Journal (J3) | 1 |
New England Journal of Higher… | 1 |
School Administrator | 1 |
Author
Bailey, Gerald D. | 1 |
Franz, Dana Pomykal | 1 |
Miller, Nicole C. | 1 |
Mills, Lane B. | 1 |
Pownell, David | 1 |
Qayoumi, Mohammad H. | 1 |
Thompson, Nicole L. | 1 |
Wills, Lisa M. | 1 |
Woody, Carol | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 4 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 2 |
Middle Schools | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Parents | 1 |
Students | 1 |
Teachers | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Wills, Lisa M. – New England Journal of Higher Education, 2011
When an individual hears the term risk, he/she usually thinks of the financial institutions whose mismanagement of risk was instrumental in causing the 2008 financial crash. But all organizations, including colleges and universities, face various types and levels of risk, which threaten to harm the institutions and their ability to fulfill their…
Descriptors: Higher Education, Risk Management, Risk, Access to Information
Miller, Nicole C.; Thompson, Nicole L.; Franz, Dana Pomykal – Middle School Journal (J3), 2009
Schools should be proactive rather than reactive to issues of technology safety, and this requires careful planning and policy implementation. In this article, the authors provide information and recommendations that will help middle grades educators, students, and parents to safely and successfully manage the many technologies they encounter and…
Descriptors: Middle Schools, Middle School Students, Early Adolescents, Educational Technology
Mills, Lane B. – School Administrator, 2004
School district networks are particularly difficult to protect given the diverse types of users, software, equipment and connections that most school districts provide. Vulnerabilities to the security of school district's technology infrastructure can relate to users, data, software, hardware and transmission. This article discusses different…
Descriptors: Educational Technology, School Districts, Computer Security, Privacy
Pownell, David; Bailey, Gerald D. – American School Board Journal, 2001
Handheld computers are just beginning to be introduced in schools. Before adopting the latest innovation, administrators must ask careful questions about issues and implications regarding leadership, teaching and learning, staff development, technology support, planning, infrastructure, safety and security, ethics, evaluation, curriculum, change,…
Descriptors: Administrator Responsibility, Computer Security, Computer Uses in Education, Elementary Secondary Education
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy