Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Networks | 4 |
Educational Administration | 4 |
Information Technology | 4 |
Computer Uses in Education | 3 |
Computer Security | 2 |
Educational Practices | 2 |
Educational Technology | 2 |
Elementary Secondary Education | 2 |
Foreign Countries | 2 |
Models | 2 |
School Districts | 2 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Audience
Practitioners | 2 |
Administrators | 1 |
Media Staff | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Price, Betsy – Principal Leadership, 2005
In recent years, principals have had to act as referees for a new type of match between teachers and technology staff members, affectionately known as the "techies." This time the match is for the control of the technology-integrated classroom. Creating technology-integrated classrooms often puts the interests of teachers in opposition to the…
Descriptors: Principals, Classroom Techniques, Classification, Educational Technology
Dussome, Webb; Rozmahel, Kathleen – 1999
This study examined how technology funding is planned, deployed and managed in six Alberta school jurisdictions and identified best practices and recommended strategies. Specific objectives were to research and examine, via interviews with technology personnel in each jurisdiction, the funding frameworks in place, and to report on commonalties,…
Descriptors: Centralization, Computer Networks, Computer Uses in Education, Decentralization
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software