Publication Date
| In 2026 | 1 |
| Since 2025 | 71 |
| Since 2022 (last 5 years) | 388 |
| Since 2017 (last 10 years) | 660 |
| Since 2007 (last 20 years) | 1212 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Christine Wusylko | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 44 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 29 |
| Turkey | 23 |
| Canada | 22 |
| Texas | 22 |
| California | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| China | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education
Kean, Sam – Chronicle of Higher Education, 2007
In this article, the author discusses a computer program called Psiphon which bypasses government filters undetected. The University of Toronto's Citizen Lab, a research center for digital media and politics, designed Psiphon for technology-savvy activists. Some technology-savvy activists use other open-source software, like Tor (which relies on…
Descriptors: Foreign Countries, Information Technology, Computer Software, Social Networks
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Garland, Virginia E. – Journal of Educational Technology Systems, 2010
What is the school principal's role in ensuring ethical technology use while promoting the use of wireless and advanced technologies in instruction? The rapid advances in technology in only the past 5 years, including the increase in laptops and smart phones, have transformed both educational practices and the role of the school principal as…
Descriptors: Educational Practices, Moral Issues, Student Diversity, Ethics
Pardini, Priscilla – School Administrator, 2007
This article reports on how superintendents are riding the wave of personal technology. Once reluctant users, superintendents now find their hand-held devices an indispensable tool for leveraging their school system leadership. However, as the availability and allure of personal technology devices proliferate, superintendents find themselves…
Descriptors: Superintendents, Computer Mediated Communication, Electronic Equipment, Physical Mobility
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security
Panettieri, Joseph C. – Campus Technology, 2007
There's no silver bullet to information security; universities must continue to keep their antivirus, anti-spyware, firewall, and patch management systems in good working order. These days, the largest target for hackers appears to be university databases. Now, universities are searching for new solutions to safeguard those systems. This article…
Descriptors: Databases, Best Practices, Higher Education, Technology Planning
Carnevale, Dan – Chronicle of Higher Education, 2007
The USA Patriot Act is having far-reaching effects on the kinds of data that wind up on some academics' computers in Canada. Canadian colleges, responding to provincial laws passed in reaction to the Patriot Act, are preventing professors from entering the United States with students' private data on their laptops and limiting the locations of…
Descriptors: Higher Education, Public Colleges, Foreign Countries, Federal Legislation
Shermis, Mark D.; Averitt, Jason – 2000
The purpose of this paper is to enumerate a series of security steps that might be taken by those individuals or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations focus…
Descriptors: Computer Security, Data Analysis, Performance Based Assessment, World Wide Web
Lei, Kimfong; Schmidt, Therese; Schaffer, Scott P.; Um, Eun Joon – Association for Educational Communications and Technology, 2004
The American Society for Training and Development (ASTD) defines human performance technology (HPT) as "a systematic approach to analyzing, improving, and managing performance in the workplace through the use of appropriate and varied interventions." The first step in this approach is the performance analysis (Gilbert, 1978). In this…
Descriptors: Program Effectiveness, Graduate Students, Computer Security, Performance Technology
Edwards, Mark A. – School Administrator, 2003
Describes use of wireless technology system involving laptop computers in Henrico County Public Schools in Richmond, Virginia. Briefly describes some lessons learned about the use of laptops and the major components of the laptop security plan. Reports laptop-supported advances in student achievement. (PKP)
Descriptors: Academic Achievement, Computer Assisted Instruction, Computer Security, Elementary Secondary Education
Kovac, Ron J. – School Business Affairs, 1999
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Descriptors: Computer Security, Costs, Elementary Secondary Education, Guidelines
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention
Vandegrift, Kay E. – School Library Journal, 1996
Describes procedures for librarians interested in building a World Wide Web site. Highlights include hypertext markup language; home pages; determining audiences and purposes; promoting safety; the planning process, including text length and density, links to external sites, and maintenance; and copyright concerns. (LRW)
Descriptors: Audiences, Computer Security, Copyrights, Planning
Wodarz, Nan – School Business Affairs, 2001
A computer virus is a program that replicates itself, in conjunction with an additional program that can harm a computer system. Common viruses include boot-sector, macro, companion, overwriting, and multipartite. Viruses can be fast, slow, stealthy, and polymorphic. Anti-virus products are described. (MLH)
Descriptors: Computer Security, Computer Software, Electronic Mail, Elementary Secondary Education

Peer reviewed
Direct link
