Descriptor
Computer Security | 5 |
Elementary Secondary Education | 5 |
Guidelines | 5 |
Computer Uses in Education | 2 |
Internet | 2 |
Access to Computers | 1 |
Access to Information | 1 |
Administrator Responsibility | 1 |
Computer Assisted Instruction | 1 |
Computer Networks | 1 |
Coordination | 1 |
More ▼ |
Source
American School Board Journal | 1 |
ED, Education at a Distance | 1 |
Educational Leadership | 1 |
Journal of Instruction… | 1 |
School Business Affairs | 1 |
Author
Bailey, Gerald D. | 1 |
Cradler, John | 1 |
Frazier, Max K. | 1 |
Kovac, Ron J. | 1 |
Littman, Marlyn Kemper | 1 |
Pownell, David | 1 |
Yrchik, John | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Reports - Evaluative | 2 |
Opinion Papers | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Frazier, Max K. – Educational Leadership, 1995
Like other technologies, the Internet is vulnerable to misuse by hostile individuals (flamers), sexual predators, and pornographers. Schools can shield students from these negative influences by using LinQ, a new product that restricts access to certain inappropriate Internet areas. Technology codes of conduct and staff development are alternative…
Descriptors: Computer Security, Elementary Secondary Education, Guidelines, Pornography
Kovac, Ron J. – School Business Affairs, 1999
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Descriptors: Computer Security, Costs, Elementary Secondary Education, Guidelines
Pownell, David; Bailey, Gerald D. – American School Board Journal, 2001
Handheld computers are just beginning to be introduced in schools. Before adopting the latest innovation, administrators must ask careful questions about issues and implications regarding leadership, teaching and learning, staff development, technology support, planning, infrastructure, safety and security, ethics, evaluation, curriculum, change,…
Descriptors: Administrator Responsibility, Computer Security, Computer Uses in Education, Elementary Secondary Education
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Yrchik, John; Cradler, John – ED, Education at a Distance, 1994
Discusses guidelines that were developed to ensure that the National Information Infrastructure provides expanded opportunities for education and training. Topics include access requirements for homes and work places as well as schools; education and training application requirements, including coordination by federal departments and agencies; and…
Descriptors: Access to Computers, Access to Information, Computer Assisted Instruction, Computer Security