Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 16 |
Descriptor
Computer Networks | 35 |
Computer Security | 35 |
Computer Uses in Education | 35 |
Information Technology | 16 |
Internet | 16 |
Higher Education | 14 |
Educational Technology | 11 |
Telecommunications | 11 |
Computer Software | 10 |
Elementary Secondary Education | 9 |
Information Systems | 8 |
More ▼ |
Source
Author
Hawkins, Brian L. | 2 |
Littman, Marlyn Kemper | 2 |
Rudy, Julia A. | 2 |
Alexander, Charles | 1 |
Astrom, Peik | 1 |
Battisti, F. | 1 |
Beasley, William | 1 |
Bedi, Param | 1 |
Bergstrom, Laura | 1 |
Boato, G. | 1 |
Camp, John S. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 14 |
Elementary Secondary Education | 6 |
Postsecondary Education | 5 |
Two Year Colleges | 1 |
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Location
China | 2 |
Finland | 2 |
Arizona | 1 |
Australia | 1 |
Canada | 1 |
France | 1 |
Indiana | 1 |
Italy | 1 |
Macau | 1 |
Maryland | 1 |
Massachusetts | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Alexander, Charles – ProQuest LLC, 2018
Encryption based ransomware operates by iterating through all files with specific extensions on the computer and mutating them into an unusable form. The mutation, in many cases, can only be reversed if the user pays the operator of the ransomware a fee to get their files back. K-12 school districts have fallen victim to rampant malware as a…
Descriptors: Computer Security, School Districts, Elementary Secondary Education, Computer Uses in Education
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Hoffman, Richard – Technology & Learning, 2007
Wireless connectivity in schools is all the rage, and many school systems have at least gotten their feet wet with a wireless lab or a few portable laptop carts. But Bijaya Devkota, the chief information officer of Charles County Public Schools, has done what many school systems only dream of--implemented universal wireless access throughout his…
Descriptors: Computer Networks, Telecommunications, Computer Uses in Education, Public Schools
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2008
EDUCAUSE Core Data Service Fiscal Year 2007 Summary Report summarizes much of the data collected through the 2007 EDUCAUSE core data survey about campus information technology (IT) environments at 994 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Ekhaml, Leticia – School Library Media Activities Monthly, 2001
Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Electronic Mail
Cole, David R. – E-Learning, 2007
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process…
Descriptors: Electronic Learning, Terrorism, Internet, Educational Technology
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Enyeart, Mike; Staman, E. Michael; Valdes, Jose J., Jr. – EDUCAUSE Review, 2007
The concept of convergence has evolved significantly during recent years. Today, "convergence" refers to the integration of the communications and computing resources and services that seamlessly traverse multiple infrastructures and deliver content to multiple platforms or appliances. Convergence is real. Those in higher education, and especially…
Descriptors: Educational Opportunities, Higher Education, Educational Trends, Surveys
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Review, 2007
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2006 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Computer Software, Telecommunications, Computer Networks, Computer Uses in Education