Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Networks | 5 |
Elementary Secondary Education | 5 |
Privacy | 5 |
Computer Security | 4 |
Data | 2 |
Higher Education | 2 |
Information Management | 2 |
Internet | 2 |
Planning | 2 |
School Policy | 2 |
Academic Achievement | 1 |
More ▼ |
Source
International Association for… | 1 |
Journal of Instruction… | 1 |
National Forum on Education… | 1 |
School Business Affairs | 1 |
State Education Standard | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 1 |
Guides - General | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Evaluative | 1 |
Education Level
Elementary Secondary Education | 3 |
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Parents | 1 |
Policymakers | 1 |
Location
United States | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Mazur, Joan M. – School Business Affairs, 1995
As schools merge onto the information highway, districts must address their liability associated with Internet access. Schools need a practical policy supporting high access to global educational resources while limiting district liability. USENET provides easy access to controversial and pornographic materials. This article outlines federal…
Descriptors: Computer Networks, Elementary Secondary Education, Freedom of Information, Legal Responsibility
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers