Publication Date
| In 2026 | 1 |
| Since 2025 | 67 |
| Since 2022 (last 5 years) | 384 |
| Since 2017 (last 10 years) | 656 |
| Since 2007 (last 20 years) | 1208 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 44 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 29 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| China | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Dunn, Deborah – Association of Small Computer Users in Education (ASCUE), 2005
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
Descriptors: Databases, Information Technology, Computer Security, Computer Literacy
Soete, George J., Comp.; Zimmerman, Glen, Comp. – 1999
This SPEC (Systems and Procedures Exchange Center) Kit and Flyer reports results of a survey conducted in January 1999 that examined how ARL (Association of Research Libraries) member libraries assure the safety and security of persons, library materials, physical facilities, furnishings, computer equipment, etc. Forty-five of the 122 ARL member…
Descriptors: Academic Libraries, Computer Security, Foreign Countries, Higher Education
Petro, Jim – 1999
Survey data obtained in recent audits updated Ohio's local government units' assessment of Year 2000 (Y2K) readiness. The survey was developed with three intended objectives: (1) to provide an accurate assessment of the efforts to remediate the Y2K problem in Ohio's school districts, cities and counties; (2) to identify issues that could affect…
Descriptors: City Government, Computer Security, Counties, Elementary Secondary Education
New York State Office of the Comptroller, Albany. Div. of Management Audit. – 2000
This audit report of the State University of New York (SUNY) College of Agriculture and Technology at Morrisville addresses the question of whether the college management has established an effective system of internal control over its revenue, equipment, and student work-study payroll. The audit makes a number of observations and conclusions.…
Descriptors: Accountability, Administration, Computer Security, Educational Finance
Blezard, Rob – Community College Journal, 2002
Discusses ways in which community colleges are lending their expertise and experience to help make the nation safer after the September 11th attacks. Reports that community colleges are instituting public safety and cybersecurity measures on their campuses and teaching others to do the same. Adds that community colleges are also training public…
Descriptors: College Role, Community Colleges, Computer Security, Crime
McCollum, Kelly – Chronicle of Higher Education, 1999
Colleges and universities are finding that ways to misbehave in computer-mediated communication come along faster than institutions can create policies to deal with them. Although most schools have acceptable-use policies, technological advances change the environment quickly and require flexible policies. Most institutions have created a mix of…
Descriptors: Administrative Policy, Computer Mediated Communication, Computer Networks, Computer Security
Peer reviewedVondracek, Mark – Staff and Educational Development International, 1999
Discusses the potential of technology in classrooms, along with the problems that occur with implementing curricular changes throughout an entire school. Addresses considerations such as staff development, parent acceptance and involvement, student vandalism and overall hardware and software security, and the inclusion of technology in…
Descriptors: Computer Assisted Instruction, Computer Security, Computer Uses in Education, Curriculum Development
Collet, Robert – Telecommunications, 1998
Argues that the Internet can continue its explosive growth only if it is carefully, constantly, and thoughtfully administered. Discusses the role of ISPs (Internet Service Providers); the need to respond to the market force; making the transition from the federal to the commercial level; funding; the domain name server; security; and challenges to…
Descriptors: Computer Security, Financial Support, Futures (of Society), Government (Administrative Body)
Peer reviewedSmith, Bruce; Fraser, Bruce T.; McClure, Charles R. – Journal of Academic Librarianship, 2000
Considers selected policy instruments related to federal agencies' deployment of information in a Web environment in terms of five key policy areas: access, security, privacy, intellectual property, and records management. Suggests that there are a significant number of policy instruments affecting federal Web site development. Identifies the need…
Descriptors: Access to Information, Computer Security, Document Delivery, Government Publications
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development
Peer reviewedRovai, Alfred P. – Internet and Higher Education, 2000
Identifies the major principles of general assessment theory, examines how these principles can be applied to online environments for distance education, and describes assessment issues that have special significance in virtual classrooms. Discusses proctored testing, identity security, academic honesty, and use of online discussions for…
Descriptors: Cheating, Computer Security, Constructivism (Learning), Discussion (Teaching Technique)
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This September 24, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Thank You, Masked Man" (Reilly, Liam); (2) "The Trailing-Spouse…
Descriptors: Higher Education, Biological Sciences, Scholarship, College Faculty
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Lawhon, Tommie; Ennis-Cole, Demetria; Lawhon, David C. – Community College Journal of Research & Practice, 2006
Practical information on the necessity for community colleges, instructors, and students to understand and abide by the copyright laws is essential. Whether developing, structuring, maintaining, or presenting courses, or instructing students on the development of their own papers, one must be knowledgeable about plagiarism, the Fair Use Act, and…
Descriptors: Copyrights, Plagiarism, Distance Education, Community Colleges
Barrett, Joanne – Learning & Leading with Technology, 2006
Social networking is one of the latest trends to evolve out of the growing online community. Social networking sites gather data submitted by members that is then stored as user profiles. The data or profiles can then be shared among the members of the site. Membership can be free or fee-based. A typical social networking site provides members…
Descriptors: Elementary Secondary Education, Profiles, Social Networks, Web Sites

Direct link
