Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 7 |
Computer Software | 7 |
Educational Policy | 7 |
Educational Technology | 5 |
Foreign Countries | 4 |
Computer Uses in Education | 3 |
Elementary Secondary Education | 3 |
Internet | 3 |
Access to Information | 2 |
Computer Networks | 2 |
Data | 2 |
More ▼ |
Source
Technology, Pedagogy and… | 2 |
Chronicle of Higher Education | 1 |
EDUCAUSE Quarterly | 1 |
International Journal of… | 1 |
National School Boards… | 1 |
Author
Czuprynski, Christine N. | 1 |
Fan, Andy | 1 |
Hope, Andrew | 1 |
Nixon, Andrea | 1 |
Powell, Ken | 1 |
Russell, Terry | 1 |
Szuba, Tom | 1 |
Wickens, Cathy | 1 |
Woollard, John | 1 |
Publication Type
Journal Articles | 5 |
Guides - Non-Classroom | 2 |
Reports - Research | 2 |
Collected Works - Serial | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Education Level
Elementary Secondary Education | 3 |
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Administrators | 2 |
Policymakers | 1 |
Practitioners | 1 |
Teachers | 1 |
Location
United Kingdom | 2 |
Albania | 1 |
China | 1 |
Colorado | 1 |
Macau | 1 |
North Korea | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Czuprynski, Christine N. – National School Boards Association, 2019
"Data security" describes the protections in place to prevent unauthorized access to or acquisition of personal student and staff information. A school district's data security measures might include keeping student and staff personal data in locked filing cabinets, and limiting access to those filing cabinets to people within the school…
Descriptors: Elementary Secondary Education, Boards of Education, Data, Information Security
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
Hope, Andrew – Technology, Pedagogy and Education, 2008
In the last decade, Internet provision has become widespread within schools in many economically developed countries. Proponents of such technology have stressed the potential benefits to be gained from innovative teaching and learning opportunities. Yet, herein purity and danger are seen to co-exist, with unregulated "pollutants"…
Descriptors: Internet, Foreign Countries, Discourse Analysis, Technology Integration
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Chronicle of Higher Education, 2005
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This April 1, 2005 issue of "Chronicle of Higher Education" includes the following articles: (1) "Hollywood Profits v. Technological Progress" (Ben-Atar, Doron); (2)…
Descriptors: Higher Education, Educational Technology, Copyrights, Foreign Countries
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software