NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,186 to 1,200 of 1,624 results Save | Export
Huber, Joe – Library Media Connection, 2005
Desktop security is the foundation of your overall security plan in K-12 education. National Educational Technology Standards (NETS) mainly states that students at all grade levels should know to make changes in the default settings for the operating system and its applications.
Descriptors: Elementary Secondary Education, Educational Technology, Educational Policy, Computer Security
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Garland, Virginia E. – Journal of Educational Technology Systems, 2010
What is the school principal's role in ensuring ethical technology use while promoting the use of wireless and advanced technologies in instruction? The rapid advances in technology in only the past 5 years, including the increase in laptops and smart phones, have transformed both educational practices and the role of the school principal as…
Descriptors: Educational Practices, Moral Issues, Student Diversity, Ethics
Pardini, Priscilla – School Administrator, 2007
This article reports on how superintendents are riding the wave of personal technology. Once reluctant users, superintendents now find their hand-held devices an indispensable tool for leveraging their school system leadership. However, as the availability and allure of personal technology devices proliferate, superintendents find themselves…
Descriptors: Superintendents, Computer Mediated Communication, Electronic Equipment, Physical Mobility
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security
Panettieri, Joseph C. – Campus Technology, 2007
There's no silver bullet to information security; universities must continue to keep their antivirus, anti-spyware, firewall, and patch management systems in good working order. These days, the largest target for hackers appears to be university databases. Now, universities are searching for new solutions to safeguard those systems. This article…
Descriptors: Databases, Best Practices, Higher Education, Technology Planning
Carnevale, Dan – Chronicle of Higher Education, 2007
The USA Patriot Act is having far-reaching effects on the kinds of data that wind up on some academics' computers in Canada. Canadian colleges, responding to provincial laws passed in reaction to the Patriot Act, are preventing professors from entering the United States with students' private data on their laptops and limiting the locations of…
Descriptors: Higher Education, Public Colleges, Foreign Countries, Federal Legislation
Peer reviewed Peer reviewed
Direct linkDirect link
Landry, Brett J. L.; Koger, M. Scott – Journal on Educational Resources in Computing, 2006
Disasters happen all the time; yet despite this, many organizations are caught unprepared or make unrealistic assumptions. These factors create environments that will fail during a disaster. Most information technology (IT) curricula do not cover disaster recovery (DR) plans and strategies in depth. The unfortunate result is that most new computer…
Descriptors: Emergency Programs, Information Technology, Misconceptions, Natural Disasters
Borja, Rhea R. – Education Week, 2006
While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…
Descriptors: Computer Security, Computer Networks, Students, Crime
Watkins, Donna – Computers in Libraries, 2006
Wireless hotspots are popping up in local coffee shops everywhere. Anyone with a wireless-ready laptop or PDA can surf the Internet at one of these hotspots. The same is now true for all 32 branches of the Orange County Public Library (OCPL) in California. Though many public library systems are moving toward wireless access, most require patrons…
Descriptors: Computer Networks, Telecommunications, Public Libraries, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Workman, Sue; Childs, Melody; Causey, Jim; Moberly, Brent; Fitzpatrick, Christine – EDUCAUSE Quarterly, 2006
At the beginning of an academic year, thousands of students move into campus housing on Indiana University's Bloomington and Indianapolis campuses within a three-day period, and more than 96 percent arrive with at least one personal computer (and possibly also a PDA, cell phone, and gaming system), and most expect to connect to the campus network…
Descriptors: Computer Networks, Student Personnel Services, Information Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Adler, M. Peter – EDUCAUSE Review, 2006
The increased number of government-mandated and private contractual information security requirements in recent years has caused higher education security professionals to view information security as another aspect of regulatory or contractual compliance. The existence of fines, penalties, or loss (including bad publicity) has also increased the…
Descriptors: Higher Education, Publicity, Computer Security, Colleges
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…
Descriptors: Computers, Computer Security, Crime Prevention, Internet
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Pages: 1  |  ...  |  76  |  77  |  78  |  79  |  80  |  81  |  82  |  83  |  84  |  ...  |  109