Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Surveys | 2 |
| College Students | 1 |
| Computers | 1 |
| Ethics | 1 |
| Evaluation Methods | 1 |
| Faculty | 1 |
| Faculty Development | 1 |
| Influences | 1 |
| Information Technology | 1 |
| Internet | 1 |
| More ▼ | |
Source
| Education Digest: Essential… | 2 |
Author
| Young, Jeffrey R. | 1 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 1 |
| Reports - Evaluative | 1 |
Education Level
| Elementary Education | 1 |
| Elementary Secondary Education | 1 |
| Grade 12 | 1 |
| Grade 2 | 1 |
| Grade 3 | 1 |
| Grade 4 | 1 |
| Grade 5 | 1 |
| Grade 6 | 1 |
| Grade 7 | 1 |
| Grade 8 | 1 |
| Grade 9 | 1 |
| More ▼ | |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Education Digest: Essential Readings Condensed for Quick Review, 2009
This article presents findings from a study that explores the nature of the Cyberethics, Cybersafety, and Cybersecurity (C3) educational awareness policies, initiatives, curriculum, and practices currently taking place in the U.S. public and private K-12 educational settings. The study establishes baseline data on C3 awareness, which can be used…
Descriptors: Program Design, Information Technology, Computer Security, Ethics
Young, Jeffrey R. – Education Digest: Essential Readings Condensed for Quick Review, 2009
In this article, the author presents the top-10 list of campus computer-security risks he compiled based on several recent computing surveys and interviews with more than a dozen college-technology leaders. The list, ordered from least to most serious, is by no means scientific, but it gives a sense of where today's battle lines are--and why…
Descriptors: Computer Security, Computers, Social Networks, Evaluation Methods

Direct link
