Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 3 |
Crime Prevention | 3 |
Elementary Secondary Education | 3 |
Computer Security | 2 |
Information Security | 2 |
Accountability | 1 |
Community Programs | 1 |
Computer Literacy | 1 |
Computer Uses in Education | 1 |
Confidential Records | 1 |
Crime | 1 |
More ▼ |
Author
Scrogan, Len | 1 |
Wang, Jianjun | 1 |
Publication Type
Reports - Descriptive | 2 |
Guides - General | 1 |
Journal Articles | 1 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 2 |
High Schools | 1 |
Higher Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Policymakers | 2 |
Administrators | 1 |
Parents | 1 |
Practitioners | 1 |
Location
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Scrogan, Len – Classroom Computer Learning, 1988
Discusses some of the misuses of telecommunicating using school computers, including online piracy, hacking, phreaking, online crime, and destruction boards. Suggests ways that schools can deal with these problems. (TW)
Descriptors: Computer Literacy, Computer Networks, Computer Uses in Education, Crime