Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Author
Forney, Steven | 1 |
Hairston, Jesse R. | 1 |
Sabados, William T. | 1 |
Smith, Derrick W. | 1 |
Waters, John K. | 1 |
Williams, Tania | 1 |
Publication Type
Reports - Descriptive | 3 |
Journal Articles | 2 |
Education Level
Secondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Audience
Location
Alabama | 3 |
Arizona | 1 |
Arkansas | 1 |
Canada | 1 |
Florida | 1 |
Georgia | 1 |
Indiana | 1 |
Louisiana | 1 |
Michigan | 1 |
Mississippi | 1 |
Missouri | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Hairston, Jesse R.; Smith, Derrick W.; Williams, Tania; Sabados, William T.; Forney, Steven – Journal of Science Education for Students with Disabilities, 2020
This work showcases specific adaptations used to make cybersecurity accessible to high school students with visual impairments and blindness (VIB). The rapidly growing field of cybersecurity demands a diverse workforce; however, barriers exist which can deter students with disabilities from studying cybersecurity, let alone pursuing a career in…
Descriptors: Visual Impairments, Blindness, High School Students, Computer Security
Foundation for Excellence in Education (ExcelinEd), 2014
A full year of progress in advancing education reform across America is documented in each of the Foundation for Excellence in Education's Annual Reports. The illustrated pages of the 2014 report, provide data-rich updates on Excellence in Education's work to advance student-centered policies in more than 40 states, all aimed at improving learning…
Descriptors: Educational Change, Educational Quality, Excellence in Education, Student Centered Learning
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment