Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Source
ProQuest LLC | 2 |
International Association for… | 1 |
Journal of Education for… | 1 |
National Forum on Education… | 1 |
TechTrends: Linking Research… | 1 |
Author
Brown, Brandon R. | 1 |
Butler, Rebecca P. | 1 |
Cradduck, Lucy | 1 |
Gregory, Mark A | 1 |
Hare, Karen | 1 |
Talab, Rosemary S. | 1 |
Zhao, Jensen | 1 |
Zhao, Sherry Y. | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 2 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Guides - General | 1 |
Legal/Legislative/Regulatory… | 1 |
Non-Print Media | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Adult Education | 1 |
Elementary Secondary Education | 1 |
Kindergarten | 1 |
Audience
Policymakers | 2 |
Administrators | 1 |
Parents | 1 |
Location
Australia | 1 |
California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Gregory, Mark A; Cradduck, Lucy – International Association for Development of the Information Society, 2016
This research seeks to identify the differing national perspectives towards security and the "gigabit race" as those nations transition to their next generation broadband networks. Its aim is to critically appraise the rationales for their existing digital security frameworks in order to determine whether (and what) Australia can learn…
Descriptors: Foreign Countries, Computer Security, Telecommunications, National Security
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Talab, Rosemary S.; Butler, Rebecca P. – TechTrends: Linking Research and Practice to Improve Learning, 2007
The concept of "publishing" has changed again, just in the last few years, due to YouTube, Blogger, Second Life, Flickr, and other new social networking tools (John Marshall Law School, 2005). Whether they are making it possible for everyone to view a video on YouTube on how to install a hard drive on a Mac, add a collaborative student writing…
Descriptors: Guidelines, Privacy, Copyrights, Internet
Hare, Karen – ProQuest LLC, 2008
Implementation of information systems has lagged in many areas of clinical healthcare for a variety of reasons. Economics, data complexity and resistance are among the often quoted roadblocks. Research suggests that physicians play a major part in the adoption, use and diffusion of information technology (IT) in clinical settings. There are also…
Descriptors: Information Needs, Physicians, Information Systems, Information Technology
American Library Association Video/Library Video Network, Towson, MD. – 1997
This 30-minute videotape takes an in-depth look at World Wide Web business transactions, potential risks, client privacy and security issues by asking businesses and consumers how they do business on the Internet. Also featured in the program is advice about choosing a secure password, the use of credit cards for Web purchasing and a review of…
Descriptors: Business, Computer Oriented Programs, Computer Security, Computer Use
General Accounting Office, Washington, DC. – 1995
This report focuses on the pivotal technical issues associated with the National Information Infrastructure program, security and privacy, interoperability, and reliability, and presents the General Accounting Office's findings on these challenges. It is reported that while the structures and services to be offered by the information superhighway…
Descriptors: Communications, Computer Networks, Computer Security, Confidentiality
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography