Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Watkins, Donna – Computers in Libraries, 2006
Wireless hotspots are popping up in local coffee shops everywhere. Anyone with a wireless-ready laptop or PDA can surf the Internet at one of these hotspots. The same is now true for all 32 branches of the Orange County Public Library (OCPL) in California. Though many public library systems are moving toward wireless access, most require patrons…
Descriptors: Computer Networks, Telecommunications, Public Libraries, Internet
Workman, Sue; Childs, Melody; Causey, Jim; Moberly, Brent; Fitzpatrick, Christine – EDUCAUSE Quarterly, 2006
At the beginning of an academic year, thousands of students move into campus housing on Indiana University's Bloomington and Indianapolis campuses within a three-day period, and more than 96 percent arrive with at least one personal computer (and possibly also a PDA, cell phone, and gaming system), and most expect to connect to the campus network…
Descriptors: Computer Networks, Student Personnel Services, Information Technology, Computer Security
Adler, M. Peter – EDUCAUSE Review, 2006
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Descriptors: Higher Education, Publicity, Computer Security, Colleges
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…
Descriptors: Computers, Computer Security, Crime Prevention, Internet
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Villano, Matt – Campus Technology, 2008
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Descriptors: Computer Uses in Education, Technological Advancement, Technology Uses in Education, Video Technology
Shermis, Mark D.; Averitt, Jason – 2000
The purpose of this paper is to enumerate a series of security steps that might be taken by those individuals or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations focus…
Descriptors: Computer Security, Data Analysis, Performance Based Assessment, World Wide Web
Lei, Kimfong; Schmidt, Therese; Schaffer, Scott P.; Um, Eun Joon – Association for Educational Communications and Technology, 2004
The American Society for Training and Development (ASTD) defines human performance technology (HPT) as "a systematic approach to analyzing, improving, and managing performance in the workplace through the use of appropriate and varied interventions." The first step in this approach is the performance analysis (Gilbert, 1978). In this…
Descriptors: Program Effectiveness, Graduate Students, Computer Security, Performance Technology
Edwards, Mark A. – School Administrator, 2003
Describes use of wireless technology system involving laptop computers in Henrico County Public Schools in Richmond, Virginia. Briefly describes some lessons learned about the use of laptops and the major components of the laptop security plan. Reports laptop-supported advances in student achievement. (PKP)
Descriptors: Academic Achievement, Computer Assisted Instruction, Computer Security, Elementary Secondary Education
Kovac, Ron J. – School Business Affairs, 1999
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Descriptors: Computer Security, Costs, Elementary Secondary Education, Guidelines
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention
Vandegrift, Kay E. – School Library Journal, 1996
Describes procedures for librarians interested in building a World Wide Web site. Highlights include hypertext markup language; home pages; determining audiences and purposes; promoting safety; the planning process, including text length and density, links to external sites, and maintenance; and copyright concerns. (LRW)
Descriptors: Audiences, Computer Security, Copyrights, Planning
Wodarz, Nan – School Business Affairs, 2001
A computer virus is a program that replicates itself, in conjunction with an additional program that can harm a computer system. Common viruses include boot-sector, macro, companion, overwriting, and multipartite. Viruses can be fast, slow, stealthy, and polymorphic. Anti-virus products are described. (MLH)
Descriptors: Computer Security, Computer Software, Electronic Mail, Elementary Secondary Education
Huwe, Terence K. – Computers in Libraries, 2005
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Descriptors: Internet, Computer Security, Electronic Libraries, Information Management
Peer reviewedRajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet

Direct link
