Publication Date
| In 2026 | 1 |
| Since 2025 | 71 |
| Since 2022 (last 5 years) | 388 |
| Since 2017 (last 10 years) | 660 |
| Since 2007 (last 20 years) | 1212 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Christine Wusylko | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 44 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 29 |
| Turkey | 23 |
| Canada | 22 |
| Texas | 22 |
| California | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| China | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Peer reviewedRadack, Shirley M. – Government Information Quarterly, 1994
Examines the role of the National Institute of Standards and Technology (NIST) in the development of the National Information Infrastructure (NII). Highlights include the standards process; voluntary standards; Open Systems Interconnection problems; Internet Protocol Suite; consortia; government's role; and network security. (16 references) (LRW)
Descriptors: Computer Networks, Computer Security, Consortia, Federal Government
Zirkel, Perry A. – Phi Delta Kappan, 1999
Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…
Descriptors: Censorship, Computer Security, Court Litigation, Expulsion
Zirkel, Perry A. – Phi Delta Kappan, 1998
A complex case involving a disgruntled ex-employee's invasion of a college president's e-mail system resulted in a decision granting two plaintiffs' motions for summary judgment. This was the first recorded education-related collision on the electronic superhighway. Every educational institution should have a policy and procedure regarding what…
Descriptors: Computer Security, Dismissal (Personnel), Due Process, Electronic Mail
Peer reviewedAldridge, Alicia; Forcht, Karen; Pierson, Joan – Internet Research, 1997
To cultivate an online market share, companies must design marketing strategies specifically for the Internet. This article examines the nature of business on the Internet, highlighting demographics, user control, accessibility, communication, authenticity, competition, and security and proposes a marketing strategy, including targeting and…
Descriptors: Access to Information, Advertising, Business, Competition
Peer reviewedSchool Libraries in Canada, 2000
Presents a teaching unit from the Media Awareness Network Web site that introduces students (grades six through nine) to ways in which commercial Web sites collect personal information from children and issues surrounding children and privacy on the Internet. Highlights: objective; learning outcomes; preparation and materials; the lesson; guided…
Descriptors: Child Safety, Children, Class Activities, Computer Security
McCollum, Kelly – Chronicle of Higher Education, 2000
Describes university courses and programs in protecting computer networks and World Wide Web sites from vandals, cyberterrorists, and malicious hackers. Notes such courses are provided by East Stroudsburg University (Pennsylvania), Purdue University (Indiana), George Mason University (Virginia), and Texas A&M University. Also notes the federal…
Descriptors: College Curriculum, Computer Networks, Computer Security, Government School Relationship
Peer reviewedFoster, Janet – Public Libraries, 1999
Presents information for public libraries on computer-related vulnerabilities as the century turns from 1999 to 2000. Highlights include: general Y2K information; the Y2K Bug and PCs; Y2K sites for librarians; Online Computer Library Center (OCLC) and USMARC; technological developments in cyberspace; and a list of Web sites and Y2K resources. (AEF)
Descriptors: Computer Oriented Programs, Computer Security, Computer System Design, Information Sources
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Wiley, Wayne C. – Technology & Learning, 2004
Managing district information, web sites, and data security as well as supplying information on-demand are just a few of the tasks causing educational administrators to seek new solutions these days. The answer is to streamline the business of running schools by putting all information in one place so coordinated data and files can be accessed.…
Descriptors: Information Management, Databases, Database Management Systems, Computer Software
Peer reviewedRibble, Mike S.; Bailey, Gerald D. – T.H.E. Journal, 2004
Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is beginning to emerge in society. This outbreak of technology misuse and abuse is documented in continual news coverage on TV, in newspapers and on the Internet--both inside and outside of schools. The endless list of misuse and…
Descriptors: Computer Security, Crime, Technology Education, Citizenship
Rose, Linwood H. – EDUCAUSE Review, 2004
Protecting the critical infrastructure of this country is essential to the preservation of lives as they are now lived. The time has come for leaders in higher education to recognize and creatively respond to the opportunity and realities of protecting the national critical infrastructure. To do this effectively, the academy must embrace and…
Descriptors: College Faculty, Computer Security, Higher Education, College Role
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Davis, Laurie Laughlin – Applied Psychological Measurement, 2004
Choosing a strategy for controlling item exposure has become an integral part of test development for computerized adaptive testing (CAT). This study investigated the performance of six procedures for controlling item exposure in a series of simulated CATs under the generalized partial credit model. In addition to a no-exposure control baseline…
Descriptors: Adaptive Testing, Computer Assisted Testing, Test Items, Achievement Tests
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security

Direct link
