Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Kean, Sam – Chronicle of Higher Education, 2007
In this article, the author discusses a computer program called Psiphon which bypasses government filters undetected. The University of Toronto's Citizen Lab, a research center for digital media and politics, designed Psiphon for technology-savvy activists. Some technology-savvy activists use other open-source software, like Tor (which relies on…
Descriptors: Foreign Countries, Information Technology, Computer Software, Social Networks
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Kuzu, Abdullah – Online Submission, 2009
Increasing use of information and communication technologies (ICTs) help individuals to solve several everyday problems, which used to be harder, more complicated and time consuming. Even though ICTs provide individuals with many advantages, they might also serve as grounds for several societal and ethical problems which vary in accordance with…
Descriptors: Copyrights, Content Analysis, Ethics, Interviews
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education
Balas, Janet L. – Computers in Libraries, 2006
It is easy for a library systems administrator to sometimes feel quite overwhelmed by the responsibilities of the job. Keeping a network running smoothly is a challenge in itself, but they must also be concerned with protecting the network from the many threats that exist. Constant vigilance is necessary to guard against electronic attacks…
Descriptors: Computer Security, Emergency Programs, Libraries, Information Systems
Hudomalj, Emil; Jauk, Avgust – Program: Electronic Library and Information Systems, 2006
Purpose: To give an overview of the current state and trends in authentication and authorisation in satisfying academic library users' mobility and instant access to digital information resources, and to propose that libraries strongly support efforts to establish a global authentication and authorisation infrastructure.…
Descriptors: Academic Libraries, Library Services, Access to Information, Computer Security
Howell, Kevin R. – Techniques: Connecting Education and Careers, 2006
This article features an assistant professor of technology who shares his story of near disaster and offers advice for others about protecting their data. The author presents steps that can be taken to prevent unexpected events from destroying data. The author strongly recommends using backup files as a way of securing computer files and data.…
Descriptors: Computer Security, Data, Computer Software, Computer Peripherals
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes how academic lobbyists are trying to decide whether to back a proposed bill that might shield universities from getting sued for electronic piracy, or to fight for a better deal. (EV)
Descriptors: Computer Security, Federal Legislation, Higher Education, Legal Responsibility
Wodarz, Nan – School Business Affairs, 1997
The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…
Descriptors: Computer Networks, Computer Security, Elementary Secondary Education, Internet
Peer reviewedBar-Ilan, Judit – Electronic Library, 1996
Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)
Descriptors: Coding, Computer Security, Computer System Design, Cryptography
Peer reviewedFrazier, Max K. – Educational Leadership, 1995
Like other technologies, the Internet is vulnerable to misuse by hostile individuals (flamers), sexual predators, and pornographers. Schools can shield students from these negative influences by using LinQ, a new product that restricts access to certain inappropriate Internet areas. Technology codes of conduct and staff development are alternative…
Descriptors: Computer Security, Elementary Secondary Education, Guidelines, Pornography
Peer reviewedFalk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewedBuck, S. Peter – Internet Research, 1996
Discussion of use of the Internet for online payments focuses on payment mechanisms for conducting transactions. Highlights include commercial requirements; security requirements; various proposed and currently used mechanisms; and future possibilities. (LRW)
Descriptors: Banking, Computer Security, Futures (of Society), Internet
Peer reviewedRatnasingham, Pauline – Internet Research, 1998
Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)
Descriptors: Computer Security, Guidelines, Organizational Climate, Organizational Theories
Goldsborough, Reid – School Planning & Management, 2000
Describes the use of personal firewall software to help schools ward off computer hackers. Several firewall software options are highlighted. (GR)
Descriptors: Computer Security, Computer Software, Elementary Secondary Education, Public Schools

Direct link
