Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 7 |
Descriptor
Source
ProQuest LLC | 2 |
Business-Higher Education… | 1 |
Campus Technology | 1 |
EDUCAUSE Quarterly | 1 |
Education Digest: Essential… | 1 |
Knowledge Management &… | 1 |
School Administrator | 1 |
Author
Bennett, Cedric | 1 |
Brydolf, Carol | 1 |
Dogerlioglu, Ozgur | 1 |
Gökçe, Kevser Gülnur | 1 |
Herbert C. Peluzzo Jr. | 1 |
MacFarlane, Maureen A. | 1 |
Panettieri, Joseph C. | 1 |
Stevenson, Gregory V. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Dissertations/Theses -… | 2 |
Reports - Research | 1 |
Education Level
Elementary Secondary Education | 3 |
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Gökçe, Kevser Gülnur; Dogerlioglu, Ozgur – Knowledge Management & E-Learning, 2019
Bring Your Own Device (BYOD) policy, which allows employees to use their own mobile devices for work and connection to their corporate network, is getting popular in enterprises. While companies want to improve the efficiency and productivity of employees, employees prefer to use their own devices at work, which make them feel more comfortable and…
Descriptors: Handheld Devices, Internet, Computer Security, Administrators
Stevenson, Gregory V. – ProQuest LLC, 2017
Rationale: Former President Barack Obama's $3.9 trillion for the 2015 fiscal year budget request included a $2.9 billion investment in Science, Technology, Engineering and Math (STEM) education. Research then showed that the national spending for cybersecurity has exceeded $10.7 billion in the 2015 fiscal year. Nonetheless, the number of…
Descriptors: Computer Security, Qualitative Research, Case Studies, STEM Education
Business-Higher Education Forum, 2014
The Business-Higher Education Forum (BHEF) has achieved particular success in operationalizing the National Higher Education and Workforce Initiative (HEWI) in Maryland around cybersecurity. Leveraging its membership of corporate CEOs, university presidents, and government agency leaders, BHEF partnered with the University System of Maryland to…
Descriptors: Internet, Computer Security, Corporations, College Presidents
MacFarlane, Maureen A. – School Administrator, 2007
The widespread use of virtual classrooms, Internet exploration and chat rooms has stretched the concept of the schoolhouse while the popularity of social networking sites, blogging and text messaging have affected the way students communicate with and about each other, their teachers, school administrators, and their schools. Add to the mix…
Descriptors: Educational Strategies, Internet, Computer Security, Child Safety
Brydolf, Carol – Education Digest: Essential Readings Condensed for Quick Review, 2007
As principal of the School of the Arts in San Francisco, Donn Harris is passionate about protecting his students' experiments in free expression. But about two years ago he encountered an example of creative student speech he couldn't support--a nasty post on the MySpace.com Web site that targeted some of the school's students. Deciding that his…
Descriptors: Social Networks, Principals, High Schools, Technology Uses in Education
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Bennett, Cedric – EDUCAUSE Quarterly, 2004
The Internet is a remarkable tool and change agent that has been successfully leveraged by colleges and universities to support, enhance, and extend the teaching/learning process; the creation of new knowledge through research; and the increasingly complex business of managing and administrating institutions. Although it supports and even creates…
Descriptors: State Legislation, Change Agents, Computer Security, Resource Allocation