Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 6 |
Computer Software | 6 |
Information Policy | 6 |
Internet | 5 |
Information Technology | 4 |
Privacy | 3 |
Access to Information | 2 |
Computer Networks | 2 |
Computer Uses in Education | 2 |
Educational Policy | 2 |
Educational Practices | 2 |
More ▼ |
Source
Computers in Libraries | 1 |
EDUCAUSE Quarterly | 1 |
Journal of Government… | 1 |
Public Libraries | 1 |
Technology, Pedagogy and… | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Information Analyses | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Location
Canada | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Hope, Andrew – Technology, Pedagogy and Education, 2008
In the last decade, Internet provision has become widespread within schools in many economically developed countries. Proponents of such technology have stressed the potential benefits to be gained from innovative teaching and learning opportunities. Yet, herein purity and danger are seen to co-exist, with unregulated "pollutants"…
Descriptors: Internet, Foreign Countries, Discourse Analysis, Technology Integration
Brandt, D. Scott – Computers in Libraries, 1998
Examines Internet security risks and how users can protect themselves. Discusses inadvertent bugs in software; programming problems with Common Gateway Interface (CGI); viruses; tracking of Web users; and preventing access to selected Web pages and filtering software. A glossary of Internet security-related terms is included. (AEF)
Descriptors: Access to Information, Computer Security, Computer Software, Glossaries

King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software