NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Hinojosa, Patrick – T.H.E. Journal, 2005
Information security management consists of identifying an organization's electronic informational assets, as well as the planning and programs that must be carried out to ensure its continued availability, confidentiality and integrity. Whether the organization is a commercial enterprise, governmental agency or educational institution, these…
Descriptors: Confidentiality, Integrity, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2008
As technology grows more pervasive in education, the data recovery issues that school systems encounter are becoming increasingly problematic, as districts work to accommodate a range of concerns that do not encumber commercial businesses. State and federal laws often require schools to report on student populations and educational progress…
Descriptors: Elementary Secondary Education, Educational Technology, Computer Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Starkman, Neal – T.H.E. Journal, 2007
Through conversations with students across different grade levels, there is clear evidence that two of the things they most desire contradict each other--and they use electronic technology to get both of them. This author had conversations with three groups of students in Seattle about their favorite electronic technologies, and any concerns they…
Descriptors: Privacy, High School Students, Computer Mediated Communication, Information Technology
Peer reviewed Peer reviewed
Ribble, Mike S.; Bailey, Gerald D. – T.H.E. Journal, 2004
Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is beginning to emerge in society. This outbreak of technology misuse and abuse is documented in continual news coverage on TV, in newspapers and on the Internet--both inside and outside of schools. The endless list of misuse and…
Descriptors: Computer Security, Crime, Technology Education, Citizenship
Peer reviewed Peer reviewed
Direct linkDirect link
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts