Publication Date
| In 2026 | 1 |
| Since 2025 | 71 |
| Since 2022 (last 5 years) | 388 |
| Since 2017 (last 10 years) | 660 |
| Since 2007 (last 20 years) | 1212 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Christine Wusylko | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 44 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 29 |
| Turkey | 23 |
| Canada | 22 |
| Texas | 22 |
| California | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| China | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
Just as many people log onto a Web mail site (Gmail, Yahoo, MSN, etc.) to read, write and store their email, there are Web sites out there with word processing, database, and a myriad of other software applications that are not downloadable but used on the site through a Web browser. The user does not have to download the applications to a…
Descriptors: Computer Software, Internet, Online Searching, Web Sites
Schneider, Karen G. – Library Journal, 2007
Over the next several decades, libraries will face the potential loss of all the e-journals, ebooks, electronic theses, local digital collections, and other "e-stuff" curated for the public good. A solution to this problem is LOCKSS ("Lots of Copies Keep Stuff Safe"), a free, open-source digital-preservation software from Stanford University that…
Descriptors: Computer Software, Libraries, Library Networks, Library Services
US Department of Homeland Security, 2009
The overarching goal of the National Infrastructure Protection Plan (NIPP) is to build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation's critical infrastructure and key resources (CIKR)…
Descriptors: National Security, Resources, Terrorism, Natural Disasters
Gunter, Glenda A. – MultiMedia Schools, 1997
Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)
Descriptors: Computer Security, Computer Software, Downloading, Floppy Disks
Peer reviewedLee, M. C.; Fung, Chun-Kan – Journal of the American Society for Information Science and Technology, 2003
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
Descriptors: Computer Networks, Computer Security, Internet, Logic
Peer reviewedKinkus, Jane F. – Issues in Science & Technology Librarianship, 2002
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
Descriptors: Children, Computer Security, Confidentiality, Cryptography
Olsen, Florence – Chronicle of Higher Education, 2002
Discusses how colleges are struggling with an increasing number of attacks on their computer systems; as attacks increase, they face tough, expensive challenges in keeping intruders out. (EV)
Descriptors: Computer Networks, Computer Security, Computers, Crime
Smith, Clifton – Australian Science Teachers' Journal, 2001
Describes the development of a security science degree as the emerging applied science of the protection of individuals and assets. Proposes the themes of physical, electronic, information security and facility management as scientific applications for the course. (Author/MM)
Descriptors: Computer Security, Course Descriptions, Higher Education, Science Education
Peer reviewedHinojosa, Patrick – T.H.E. Journal, 2005
Information security management consists of identifying an organization's electronic informational assets, as well as the planning and programs that must be carried out to ensure its continued availability, confidentiality and integrity. Whether the organization is a commercial enterprise, governmental agency or educational institution, these…
Descriptors: Confidentiality, Integrity, Computer Security, Information Technology
Davidson, Mary Ann – EDUCAUSE Review, 2005
Leadership in IT security is needed. Security matters: the ethics, the economics, and the social implications. There is much the academic community can do to help ensure cybersecurity. This document discusses steps academia can take to help ensure cybersecurity.
Descriptors: Internet, Computer Security, Ethics, Social Issues
Balas, Janet – Computers in Libraries, 2005
This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…
Descriptors: Public Libraries, Computers, Computer Security, Computer Software
Williams, Tracy – CUPA-HR Journal, 2003
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Descriptors: Human Resources, Colleges, Computer Security, Privacy
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security

Direct link
