Publication Date
In 2025 | 26 |
Since 2024 | 164 |
Since 2021 (last 5 years) | 424 |
Since 2016 (last 10 years) | 648 |
Since 2006 (last 20 years) | 1226 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Hoff, Dianne L.; Mitchell, Sidney N. – Journal of Educational Administration, 2009
Purpose: The purpose of this paper is to present research exploring the pervasiveness and causes of cyberbullying, the psychological impact on students, and the responses to cyberbullying from students and administrators. The goal is to give school leaders a greater understanding of this phenomenon and suggest steps to deal with this challenging…
Descriptors: Student Attitudes, Educational Policy, Bullying, Computer Security
Woszczynski, Amy B.; Shade, Sherri – Journal of Information Systems Education, 2010
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed…
Descriptors: Females, Computer Security, Gender Bias, Disproportionate Representation
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Schaffhauser, Dian – Campus Technology, 2008
Data loss from life's little power calamities may be the most common form of IT disaster any campus can face. According to a 2007 industry association survey(www.connect.educause.edu/library/ecar/shelterfromthestormitandb/41174), 82 percent of higher education institutions reporting a disruptive occurrence in the five years prior to the study…
Descriptors: Higher Education, Computer Security, Troubleshooting, Technical Support
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Boyle, Clifton J., III – ProQuest LLC, 2010
Misuse of technology is a behavioral pattern that continues to emerge in our society. Television and newspapers continue to list and report technology misuse. A recent study from the Pew Internet and American Life Project has indicated approximately one third of teen are victims of online harassment (Lenhart, 2009). Other prominent problems with…
Descriptors: Control Groups, Urban Schools, Citizenship, Video Games
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Atkinson, Al – British Columbia Council on Admissions and Transfer, 2009
The Education Planner website provides a searchable database of approximately 1,700 undergraduate post-secondary programs in British Columbia (BC). It is intended as a "one-start entry point" for students looking for post-secondary options. This independent review of Education Planner was undertaken to determine its overall…
Descriptors: Web Sites, Postsecondary Education, Undergraduate Study, Databases
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Gao, Zhiqiang – ProQuest LLC, 2006
Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…
Descriptors: Internet, Computer Security, Information Technology
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services
Goldsborough, Reid – Black Issues in Higher Education, 2004
"Cookies" are tiny Web browser helpers and are an example of how the useful can get tossed in with the dangerous through the near hysteria brought about by the real threats of computer viruses, hacking, spyware, spam and phishing. This article briefly discusses antispyware legislation by Congress and the pros and cons of past and future…
Descriptors: Computer Security, Computers, Fear, Computer Security
Hoffman, Richard – Technology & Learning, 2007
Wireless connectivity in schools is all the rage, and many school systems have at least gotten their feet wet with a wireless lab or a few portable laptop carts. But Bijaya Devkota, the chief information officer of Charles County Public Schools, has done what many school systems only dream of--implemented universal wireless access throughout his…
Descriptors: Computer Networks, Telecommunications, Computer Uses in Education, Public Schools
Panettieri, Joseph C. – Campus Technology, 2007
Imagine showing cops and robbers the blueprints to the campus. Then, letting them keep the detailed blueprints to review--over and over again--at their leisure. The robbers would memorize every nuance of the campus layout, and at some point, they'd likely plan a break-in. But on the flip side, the cops would identify security weaknesses--and help…
Descriptors: Campuses, Computer Software, Participative Decision Making, Computer Security