Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 2 |
Computer Software | 2 |
Databases | 2 |
Elementary Secondary Education | 2 |
Computer Networks | 1 |
Computer Uses in Education | 1 |
Distance Education | 1 |
Information Security | 1 |
Internet | 1 |
Postsecondary Education | 1 |
Privacy | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Elementary Secondary Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Henderson, Dave – Technology & Learning, 2005
Providing quality technical support in K-12 environments can be challenging. Unlike the business world, there is generally a less-than-ideal ratio of technical staff to computers, numerous software titles from dozens of vendors, and of course--a much smaller budget. The Victor Central School District in Victor, New York, has employed a number of…
Descriptors: Computer Uses in Education, Technical Assistance, Elementary Secondary Education, Computer Software