NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,246 to 1,260 of 1,593 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment
Gosmire, Doreen; Grady, Marilyn L. – Principal Leadership, 2007
Technology expenditures and usage in schools have risen by nearly 300 percent during the last three decades. Few principals claim to be technology experts, but most aspire to design a map that leads their schools to success with educational technology. The key to success on the journey is not to know everything, but to ask the right questions.…
Descriptors: Principals, Educational Technology, Technology Integration, Educational Trends
Peer reviewed Peer reviewed
Direct linkDirect link
Tynes, Brendesha M. – Journal of Adolescent Research, 2007
Many Internet safety and parenting experts suggest that parents prohibit their teens from social networking sites and other online spaces where predators may lurk. But we may do adolescents a disservice when we curtail their participation in these spaces, because the educational and psychosocial benefits of this type of communication can far…
Descriptors: Safety, Internet, Adolescents, Social Networks
Olagunju, Amos O. – Online Submission, 2008
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…
Descriptors: Safety, Parent Participation, Parent Role, Parent School Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Harrison, Warren – Journal on Educational Resources in Computing, 2006
The typical approach to creating an examination disk for exercises and projects in a course on computer forensics is for the instructor to populate a piece of media with evidence to be retrieved. While such an approach supports the simple use of forensic tools, in many cases the use of an instructor-developed examination disk avoids utilizing some…
Descriptors: Computer Security, Computer System Design, Evidence, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Dewey, Barbara I.; DeBlois, Peter B. – EDUCAUSE Review, 2006
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2005 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Information Technology, Surveys, Annual Reports, Strategic Planning
Hogle, Jan G. – 1996
This document is a printed copy of the Web site written to educate Internet users about potential risks associated with communication over the Internet, and to suggest precautions to reduce those risks. An Introduction highlights why users should care about privacy on the Internet, activities that can reveal personal information to others, and…
Descriptors: Computer Mediated Communication, Computer Security, Discussion Groups, Electronic Mail
Shermis, Mark D.; Averitt, Jason – 2001
The purpose of this paper is to enumerate a series of security steps that might be taken by those researchers or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations here…
Descriptors: Computer Assisted Testing, Computer Security, Performance Based Assessment, Testing Problems
US Department of Homeland Security, 2005
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
Descriptors: Public Schools, Computer Security, High Schools, Bullying
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Educom Review, 1996
Presents the first part of an interview with Vinton Cerf, senior vice president of data architecture for MCI Engineering, on the growth and future of the Internet. Topics include: pornography; commercialization; security; government role; content found on the Internet; and convergence of technologies. (DGM)
Descriptors: Business, Computer Security, Futures (of Society), Government Role
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
Carnevale, Dan – Chronicle of Higher Education, 2003
Describes how campus administrators are scrambling to follow federal rules that force colleges to comply with a law, the Financial Services Modernization Act, requiring that personal data be protected from computer mishaps. (EV)
Descriptors: Compliance (Legal), Computer Security, Confidential Records, Federal Legislation
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Pages: 1  |  ...  |  80  |  81  |  82  |  83  |  84  |  85  |  86  |  87  |  88  |  ...  |  107