Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 6 |
Information Technology | 6 |
Computer Networks | 2 |
Crime | 2 |
Educational Technology | 2 |
Internet | 2 |
Safety | 2 |
School Districts | 2 |
Attitude Measures | 1 |
Audits (Verification) | 1 |
Boards of Education | 1 |
More ▼ |
Source
T.H.E. Journal | 6 |
Author
Bailey, Gerald D. | 1 |
Hinojosa, Patrick | 1 |
Krueger, Keith R. | 1 |
Ramaswami, Rama | 1 |
Ribble, Mike S. | 1 |
Starkman, Neal | 1 |
Waters, John K. | 1 |
Williams, Cheryl S. | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 5 |
Reports - Evaluative | 1 |
Education Level
Elementary Education | 1 |
Elementary Secondary Education | 1 |
High Schools | 1 |
Middle Schools | 1 |
Audience
Practitioners | 1 |
Location
Washington | 2 |
Arizona | 1 |
Nevada | 1 |
Ohio | 1 |
Texas | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security

Hinojosa, Patrick – T.H.E. Journal, 2005
Information security management consists of identifying an organization's electronic informational assets, as well as the planning and programs that must be carried out to ensure its continued availability, confidentiality and integrity. Whether the organization is a commercial enterprise, governmental agency or educational institution, these…
Descriptors: Confidentiality, Integrity, Computer Security, Information Technology
Ramaswami, Rama – T.H.E. Journal, 2008
As technology grows more pervasive in education, the data recovery issues that school systems encounter are becoming increasingly problematic, as districts work to accommodate a range of concerns that do not encumber commercial businesses. State and federal laws often require schools to report on student populations and educational progress…
Descriptors: Elementary Secondary Education, Educational Technology, Computer Uses in Education, Technology Integration
Starkman, Neal – T.H.E. Journal, 2007
Through conversations with students across different grade levels, there is clear evidence that two of the things they most desire contradict each other--and they use electronic technology to get both of them. This author had conversations with three groups of students in Seattle about their favorite electronic technologies, and any concerns they…
Descriptors: Privacy, High School Students, Computer Mediated Communication, Information Technology

Ribble, Mike S.; Bailey, Gerald D. – T.H.E. Journal, 2004
Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is beginning to emerge in society. This outbreak of technology misuse and abuse is documented in continual news coverage on TV, in newspapers and on the Internet--both inside and outside of schools. The endless list of misuse and…
Descriptors: Computer Security, Crime, Technology Education, Citizenship
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts