Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 4 |
Elementary Secondary Education | 4 |
Information Systems | 4 |
Information Technology | 3 |
Access to Information | 2 |
Computer Uses in Education | 2 |
Educational Administration | 2 |
Educational Practices | 2 |
Educational Technology | 2 |
Foreign Countries | 2 |
Freedom of Information | 2 |
More ▼ |
Source
Journal of Cybersecurity… | 2 |
Author
A. Renee Staton | 1 |
Cathy Horn | 1 |
Deniz Gurkan | 1 |
Gillis, R. Peter | 1 |
Jennifer B. Chauvot | 1 |
Michele Kielty | 1 |
Whitemarsh, Judith | 1 |
Publication Type
Reports - Descriptive | 3 |
Guides - Non-Classroom | 2 |
Journal Articles | 2 |
Reports - Research | 1 |
Education Level
Early Childhood Education | 2 |
Elementary Education | 2 |
Elementary Secondary Education | 2 |
Kindergarten | 2 |
Primary Education | 2 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Practitioners | 2 |
Location
Canada | 2 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Michele Kielty; A. Renee Staton – Journal of Cybersecurity Education, Research and Practice, 2024
Cyber threats have escalated in recent years. Many of these threats have been direct and vicious attacks on K-12 systems. Educators are rarely trained on how to address cyber threats from a systemic and educational perspective when such challenges arise in their school buildings. This article explains the cyber threats that are looming large for…
Descriptors: School Safety, Crime, Information Technology, Kindergarten
Jennifer B. Chauvot; Deniz Gurkan; Cathy Horn – Journal of Cybersecurity Education, Research and Practice, 2023
It is critical for nations to have trained professionals in network security who can safeguard hardware, information systems, and electronic data. Network security education is a key knowledge unit of the National Centers of Academic Excellence in Cybersecurity and various information systems security curricula at the master's and bachelor's…
Descriptors: Computer Science Education, Computer Security, Computer Networks, Information Security
Alberta Dept. of Education, Edmonton. – 1999
The information in this document is based on a study that Alberta Education commissioned on establishing technology systems that are responsive to the requirements of Alberta's Freedom of Information and Protection of Privacy Act (FOIPP). This document provides an overview of key issues and suggested strategies in the following areas: (1)…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Educational Administration
Gillis, R. Peter; Whitemarsh, Judith – 1999
This study provides suggestions and best practices for superintendents, Freedom of Information and Protection of Privacy (FOIPP) coordinators and school information technologists in dealing with the impact of Alberta's FOIPP Act on the application of information technologies within their organizations. The study explores the relationship between…
Descriptors: Access to Information, Check Lists, Computer Security, Computer Uses in Education