NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 19 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Belastock, Eileen – Education Next, 2022
Of the 17 industries studied by information-security company SecurityScorecard, the education sector ranked as the least secure in 2018, with the highest vulnerabilities present in application security, endpoint security, and keeping software up to date. Online learning, which has increased gradually over the past decade and significantly since…
Descriptors: Information Security, Computer Security, Data, Information Technology
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Project Tomorrow, 2021
Project Tomorrow's® annual Speak Up Research Project has documented the evolution of technology use, both from an instructional and operational perspective, within K-12 education since 2003. Since 2017, the Speak Up results have also included a focus on K-12 districts' cybersecurity preparations. However, today, the combination of the expansion of…
Descriptors: Computer Security, Technology Uses in Education, Elementary Secondary Education, School Districts
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2022
This Information Technology Specialist Resource List provides resources on understanding the role of information technology specialists in supporting school safety before, during, and after an emergency. Resources are organized into the following categories: (1) Cybersecurity and Cyber Safety Considerations for Schools and Districts; (2)…
Descriptors: Information Technology, Specialists, Role, School Safety
Gallant, David T. – School Business Affairs, 2011
Almost everyone uses social networking sites like Facebook, MySpace, and LinkedIn. Since Facebook is the most popular site in the history of the Internet, this article will focus on how one can protect his/her personal information and how that extends to protecting the private information of others.
Descriptors: Privacy, Internet, Web Sites, Social Networks
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Technology & Learning, 2008
In this article, four directors discuss the security challenges that keep them worried and what they do about it. Dwayne Alton describes how his school district, IT School District of Lee County, Fort Meyers, Florida, collaborated with Cisco and installed an intrusion detection system which alerts IT staff when someone creates their own access…
Descriptors: Computer Security, School Districts, Information Technology, Computer Software
Blazer, Christie – Research Services, Miami-Dade County Public Schools, 2009
More and more school districts across the country are joining social networking sites, such as Facebook and MySpace. This Information Capsule discusses the frequency with which school districts are using social networking sites, how districts are using the sites, and potential drawbacks associated with their use. Issues for districts to consider…
Descriptors: Web Sites, Social Networks, Information Technology, Internet
Peer reviewed Peer reviewed
Ribble, Mike S.; Bailey, Gerald D. – T.H.E. Journal, 2004
Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is beginning to emerge in society. This outbreak of technology misuse and abuse is documented in continual news coverage on TV, in newspapers and on the Internet--both inside and outside of schools. The endless list of misuse and…
Descriptors: Computer Security, Crime, Technology Education, Citizenship
Peer reviewed Peer reviewed
Direct linkDirect link
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Consortium for School Networking (NJ1), 2006
When there is the unexpected disaster of any kind, school personnel, students, parents and communities expect to rely on communication and critical services such as payroll and access to student information the district provides and therefore the technology that supports them. Disaster recovery of IT-related operations and information is critical…
Descriptors: Emergency Programs, Crisis Management, Natural Disasters, Leadership Responsibility
Petro, Jim – 1999
Survey data obtained in recent audits updated Ohio's local government units' assessment of Year 2000 (Y2K) readiness. The survey was developed with three intended objectives: (1) to provide an accurate assessment of the efforts to remediate the Y2K problem in Ohio's school districts, cities and counties; (2) to identify issues that could affect…
Descriptors: City Government, Computer Security, Counties, Elementary Secondary Education
Previous Page | Next Page »
Pages: 1  |  2