NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Wills, Lisa M. – New England Journal of Higher Education, 2011
When an individual hears the term risk, he/she usually thinks of the financial institutions whose mismanagement of risk was instrumental in causing the 2008 financial crash. But all organizations, including colleges and universities, face various types and levels of risk, which threaten to harm the institutions and their ability to fulfill their…
Descriptors: Higher Education, Risk Management, Risk, Access to Information
Peer reviewed Peer reviewed
Direct linkDirect link
Miller, Nicole C.; Thompson, Nicole L.; Franz, Dana Pomykal – Middle School Journal (J3), 2009
Schools should be proactive rather than reactive to issues of technology safety, and this requires careful planning and policy implementation. In this article, the authors provide information and recommendations that will help middle grades educators, students, and parents to safely and successfully manage the many technologies they encounter and…
Descriptors: Middle Schools, Middle School Students, Early Adolescents, Educational Technology
Mills, Lane B. – School Administrator, 2004
School district networks are particularly difficult to protect given the diverse types of users, software, equipment and connections that most school districts provide. Vulnerabilities to the security of school district's technology infrastructure can relate to users, data, software, hardware and transmission. This article discusses different…
Descriptors: Educational Technology, School Districts, Computer Security, Privacy
Pownell, David; Bailey, Gerald D. – American School Board Journal, 2001
Handheld computers are just beginning to be introduced in schools. Before adopting the latest innovation, administrators must ask careful questions about issues and implications regarding leadership, teaching and learning, staff development, technology support, planning, infrastructure, safety and security, ethics, evaluation, curriculum, change,…
Descriptors: Administrator Responsibility, Computer Security, Computer Uses in Education, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy