Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 6 |
Educational Technology | 6 |
Program Implementation | 6 |
Computer Networks | 5 |
Foreign Countries | 3 |
Higher Education | 3 |
Computer Simulation | 2 |
Computer Uses in Education | 2 |
Internet | 2 |
Access to Information | 1 |
Administrators | 1 |
More ▼ |
Author
Baker, Elizabeth | 1 |
Booth, Kate | 1 |
Hawkins, Brian L. | 1 |
Jacka, Lisa | 1 |
Massie, Malcom | 1 |
Payne, Shirley | 1 |
Reinicke, Bryan | 1 |
Rudy, Julia A. | 1 |
Szuba, Tom | 1 |
Toothman, Callie | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Guides - Non-Classroom | 1 |
Numerical/Quantitative Data | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Audience
Administrators | 1 |
Practitioners | 1 |
Location
Australia | 2 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reinicke, Bryan; Baker, Elizabeth; Toothman, Callie – Information Systems Education Journal, 2018
Professors teaching cyber security classes often face challenges when developing workshops for their students: How does one quickly and efficiently configure and deploy an operating system for a temporary learning/testing environment? Faculty teaching these classes spend countless hours installing, configuring and deploying multiple system…
Descriptors: Computer Security, Information Security, Computer Simulation, Workshops
Jacka, Lisa; Booth, Kate – Australian Educational Computing, 2012
Virtual worlds are highly immersive, engaging and popular computer mediated environments being explored by children and adults. Why then aren't more teachers using virtual worlds in the classroom with primary and secondary school students? Reasons often cited are the learning required to master the technology, low-end graphics cards, poor…
Descriptors: Foreign Countries, Computer Security, Educational Technology, Regional Programs

Payne, Shirley – Educause Quarterly, 2003
Discusses how to develop effective security education and awareness programs to help the wide and varied groups of people on campuses understand their role in campus security, examining: target audiences (e.g., students, parents, faculty, researchers, and administrators); effective delivery methods (e.g., online quizzes, handbooks, and videos);…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification

Massie, Malcom – Orana, 1996
Scotch College (Adelaide, Australia) has networked 90% of its classrooms. This article describes the campus computer network and its hardware and configuration; World Wide Web problems and solution; a "mini Internet" of curriculum-specific materials gathered from the Web; student and faculty use; student and staff training; security;…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software