Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Elementary Secondary Education | 3 |
Information Networks | 3 |
Computer Networks | 2 |
Information Security | 2 |
Privacy | 2 |
Budgets | 1 |
Compliance (Legal) | 1 |
Computer Mediated… | 1 |
Computer Software | 1 |
Computer System Design | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 2 |
Dissertations/Theses -… | 1 |
Guides - General | 1 |
Journal Articles | 1 |
Education Level
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Audience
Administrators | 1 |
Parents | 1 |
Policymakers | 1 |
Location
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Littman, Marlyn Kemper – Journal of Online Learning, 1998
Explores capabilities of extranets (collaborative information networks between partner institutions) from the perspective of the school and university environment. Introduces distinctive features. Presents strategies and techniques for facilitating the extranet design and implementation process and delineates tactics for safeguarding extranets…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design