NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 91 to 105 of 310 results Save | Export
Reynolds, Ben – Technology & Learning, 2005
"Sleazeware" is the authors' term for spyware, adware, malware, trackware, foistware, trojans, and other programs that sleaze into computers, either as a hidden component or by tricking someone into downloading them. Once in the machine, the program phones home for purposes ranging from simply reporting where people browse to downloading…
Descriptors: Information Retrieval, Internet, Privacy, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
Peer reviewed Peer reviewed
Grealy, Joseph I. – NASSP Bulletin, 1974
Security personnel can help administrators develop ways to combat the ill effects crime has on education programs. (Author)
Descriptors: Aggression, Antisocial Behavior, Crime, Criminology
Peer reviewed Peer reviewed
Glazer, Nathan – Public Interest, 1979
The problem of graffiti on New York's subway trains is examined. Deterrence and "therapy" approaches to reduce graffiti writing are suggested. (MC)
Descriptors: Delinquency Prevention, Delinquent Rehabilitation, Safety, Security Personnel
Dowell, C. D. – Parks and Recreation, 1973
This article describes present problems in public parks, discusses the reasons for the unrest and the current blaming of public agencies, and proposes public assistance and involvement. (JA)
Descriptors: Administrative Problems, Crime, Parks, Recreational Facilities
Powell, John W. – American School and University, 1972
Traces the growth of a professional approach to security problems as student criminal actions mount. (Author)
Descriptors: Delinquent Behavior, Grants, Professional Personnel, School Security
Reeves, David E. – American School and University, 1972
Descriptors: Delinquency Prevention, Electronic Control, Fire Protection, Security
Young, George P.; Soldatis, Steven – American School & University, 1970
Several recommendations for reducing window breakage and other acts of vandalism in schools. (RA)
Descriptors: Cooperative Programs, Equipment, Lighting, Police School Relationship
Azarmsa, Reza – Educational Technology, 1991
This discussion of computer viruses explains how these viruses may be transmitted, describes their effects on data and/or computer application programs, and identifies three groups that propagate them. Ten major viruses are listed and described, and measures to deal with them are discussed. Nineteen antiviral programs are also listed and…
Descriptors: Computer Networks, Consumer Protection, Debugging (Computers), Microcomputers
Allen, Vernon L.; Greenberger, David B. – 1978
One of 52 theoretical papers on school crime and its relation to poverty, this chapter presents an aesthetic theory of vandalism and reports nine original empirical studies that are relevant to the theory. It is proposed that the act of destroying an object is enjoyable because it is, in effect, an aesthetic experience. The essay is divided into…
Descriptors: Behavior Theories, Behavioral Science Research, Creative Expression, Difficulty Level
Gjettum, Pamela – American Libraries, 1978
Tells the story of a small town library faced with the problem of preventing nuisance burglaries of the type becoming more and more common. The problems of selecting the right type of alarm system are discussed. (JPF)
Descriptors: Alarm Systems, Crime, Equipment, Prevention
Davis, Robert E. – Parks and Recreation, 1987
Suggestions are presented for designing indoor and outdoor tennis facilities that will inhibit vandalism. Recommendations include using high-quality materials that will be difficult to damage, adopting and posting rules for court use, and constructing self-contained power sources. (CB)
Descriptors: Athletic Fields, Facility Guidelines, Facility Planning, Prevention
Peer reviewed Peer reviewed
Mayer, G. Roy; And Others – Education and Treatment of Children, 1987
The study examined 28 intermediate schools to identify factors in the school environment related to vandalism. Vandalism cost and frequency were found to be greater in schools that had lower scores on a school discipline survey. Results are discussed in terms of setting factors, punishment, and reinforcement. (Author)
Descriptors: Delinquency, Discipline Problems, Educational Environment, Junior High Schools
American Libraries, 1983
Presents responses of five major bibliographic facilities--Library of Congress MARC program, Online Computer Library Center (OCLC), Research Libraries Information Network (RLIN), Washington Library Network (WLN), and University of Toronto Library Automated System (UTLAS)--to a set of fictional situations involving computer crime and security. (EJS)
Descriptors: Crime, Crime Prevention, Databases, Emergency Programs
Peer reviewed Peer reviewed
Goldmeier, Harold – Adolescence, 1974
Article described the background of vandalism committed by juveniles, the costs of vandalism, and some suggestions for dealing with vindictive vandals. (Author/RK)
Descriptors: Adolescents, Antisocial Behavior, Costs, Social Attitudes
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  21