Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 2 |
| Computer Software | 2 |
| Databases | 2 |
| Elementary Secondary Education | 2 |
| Computer Networks | 1 |
| Computer Uses in Education | 1 |
| Distance Education | 1 |
| Information Security | 1 |
| Internet | 1 |
| Postsecondary Education | 1 |
| Privacy | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Elementary Secondary Education | 2 |
| Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Henderson, Dave – Technology & Learning, 2005
Providing quality technical support in K-12 environments can be challenging. Unlike the business world, there is generally a less-than-ideal ratio of technical staff to computers, numerous software titles from dozens of vendors, and of course--a much smaller budget. The Victor Central School District in Victor, New York, has employed a number of…
Descriptors: Computer Uses in Education, Technical Assistance, Elementary Secondary Education, Computer Software

Peer reviewed
Direct link
