Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 5 |
Educational Technology | 5 |
School Security | 5 |
Higher Education | 4 |
Computer Uses in Education | 3 |
Program Development | 2 |
Access to Computers | 1 |
Access to Information | 1 |
Administrator Role | 1 |
Administrator Surveys | 1 |
Administrators | 1 |
More ▼ |
Author
Allison, Debra H. | 1 |
Bruhn, Mark | 1 |
DeBlois, Peter B. | 1 |
Gettes, Michael | 1 |
Payne, Shirley | 1 |
Smith, Peter, Ed. | 1 |
Waters, John K. | 1 |
West, Ann | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Alabama | 1 |
Canada | 1 |
Florida | 1 |
Georgia | 1 |
Indiana | 1 |
Kentucky | 1 |
Maryland | 1 |
Missouri | 1 |
New Jersey | 1 |
North Carolina | 1 |
Ohio | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information
Allison, Debra H.; DeBlois, Peter B. – EDUCAUSE Review, 2008
EDUCAUSE presents the top-ten IT-related issues in terms of strategic importance to the higher education institution, as revealed by the ninth annual EDUCAUSE Current Issues Survey. This year, "Security" moves back to the top of the list. (Contains 20 notes.)
Descriptors: Higher Education, Educational Technology, Computer Uses in Education, Computer Security
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment

Bruhn, Mark; Gettes, Michael; West, Ann – Educause Quarterly, 2003
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Elementary Secondary Education

Payne, Shirley – Educause Quarterly, 2003
Discusses how to develop effective security education and awareness programs to help the wide and varied groups of people on campuses understand their role in campus security, examining: target audiences (e.g., students, parents, faculty, researchers, and administrators); effective delivery methods (e.g., online quizzes, handbooks, and videos);…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology