Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 5 |
Internet | 5 |
Access to Information | 2 |
Computer Science Education | 2 |
Computer Software | 2 |
Copyrights | 2 |
Educational Technology | 2 |
Higher Education | 2 |
Information Technology | 2 |
Privacy | 2 |
Adolescents | 1 |
More ▼ |
Source
Chronicle of Higher Education | 1 |
EDUCAUSE Quarterly | 1 |
Educational Technology &… | 1 |
Library Journal | 1 |
ProQuest LLC | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 3 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 3 |
Elementary Education | 1 |
Postsecondary Education | 1 |
Audience
Teachers | 2 |
Administrators | 1 |
Location
New York | 5 |
Brazil | 1 |
California | 1 |
Tennessee | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Sadaghiani-Tabrizi, Avideh – ProQuest LLC, 2018
The educational system has been challenging children through competitive societal information-age education by promoting achievement among students, in preparing children for global excellence. This qualitative research case study of elementary school children's lack in cybersecurity knowledge and awareness served helpful with exploration into…
Descriptors: Computer Security, Computer Science Education, Internet, Elementary School Curriculum
Chen, Li-Chiou; Tao, Lixin – Educational Technology & Society, 2012
We have developed a tool called Secure WEb dEvelopment Teaching (SWEET) to introduce security concepts and practices for web application development. This tool provides introductory tutorials, teaching modules utilizing virtualized hands-on exercises, and project ideas in web application security. In addition, the tool provides pre-configured…
Descriptors: Internet, Computer Security, Information Security, Computer Science Education
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Freedman, Maurice J. – Library Journal, 1996
Committed to utilizing information technology, the Westchester Library System (New York) made the World Wide Web publicly accessible. Describes the planning, implementation, and management process; obstacles involving financing; establishing Internet connectivity; and vendor negotiations. Westchester hired a Web manager, created Internet use…
Descriptors: Access to Information, Computer Security, Financial Support, Information Technology
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This January 30, 2004 issue of "Chronicle for Higher Education" includes the following articles: (1) "Fighting to Get out of a Rio Slum" (Lloyd, Marion); (2) "Against…
Descriptors: Slums, Adolescents, Foreign Countries, Student Organizations