Publication Date
| In 2026 | 0 |
| Since 2025 | 3 |
| Since 2022 (last 5 years) | 27 |
| Since 2017 (last 10 years) | 51 |
| Since 2007 (last 20 years) | 148 |
Descriptor
Source
Author
| Villano, Matt | 5 |
| Hawkins, Brian L. | 3 |
| Rudy, Julia A. | 3 |
| Dixit, R. K. | 2 |
| Durkin, Sarah S. | 2 |
| Fees, Rachel E. | 2 |
| Harry May | 2 |
| Littman, Marlyn Kemper | 2 |
| McCollum, Kelly | 2 |
| Moran, Angela L. | 2 |
| Murray, Mark M. | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| Ohio | 6 |
| California | 5 |
| Pennsylvania | 5 |
| Texas | 5 |
| Florida | 4 |
| United States | 4 |
| Maryland | 3 |
| Massachusetts | 3 |
| North Carolina | 3 |
| Australia | 2 |
| China | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Family Educational Rights and… | 3 |
| Digital Millennium Copyright… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Agee, Anne Scrivener; Yang, Catherine – EDUCAUSE Review, 2009
This article presents the top-ten IT-related issues in terms of strategic importance to the institution, as revealed by the tenth annual EDUCAUSE Current Issues Survey. These IT-related issues include: (1) Funding IT; (2) Administrative/ERP Information Systems; (3) Security; (4) Infrastructure/Cyberinfrastructure; (5) Teaching and Learning with…
Descriptors: Higher Education, Information Technology, Integrated Learning Systems, Financial Support
Peer reviewedLee, M. C.; Fung, Chun-Kan – Journal of the American Society for Information Science and Technology, 2003
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
Descriptors: Computer Networks, Computer Security, Internet, Logic
Olsen, Florence – Chronicle of Higher Education, 2002
Discusses how colleges are struggling with an increasing number of attacks on their computer systems; as attacks increase, they face tough, expensive challenges in keeping intruders out. (EV)
Descriptors: Computer Networks, Computer Security, Computers, Crime
Fan, Andy – International Journal of Education and Development using Information and Communication Technology, 2010
The Portuguese came to Macau in the 16th century, Macao has become part of China again since 1999. Under the strong economic growth in recent years, the Macao government has invested substantial human, material and financial resources for the implementation of IT in education in Macau since 2001. This paper reviewed the development of IT in…
Descriptors: Information Technology, Technology Integration, Foreign Countries, Economic Progress
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Wodarz, Nan – School Business Affairs, 1997
The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…
Descriptors: Computer Networks, Computer Security, Elementary Secondary Education, Internet
Peer reviewedFalk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewedWalery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks
Borja, Rhea R. – Education Week, 2006
While schools rightly fear break-ins to their computer systems by professional criminals, students are increasingly giving educators almost as much to worry about. Reports of students' gaining access to school networks to change grades, delete teachers' files, or steal data are becoming more common, experts say, and many districts remain highly…
Descriptors: Computer Security, Computer Networks, Students, Crime
Watkins, Donna – Computers in Libraries, 2006
Wireless hotspots are popping up in local coffee shops everywhere. Anyone with a wireless-ready laptop or PDA can surf the Internet at one of these hotspots. The same is now true for all 32 branches of the Orange County Public Library (OCPL) in California. Though many public library systems are moving toward wireless access, most require patrons…
Descriptors: Computer Networks, Telecommunications, Public Libraries, Internet
Workman, Sue; Childs, Melody; Causey, Jim; Moberly, Brent; Fitzpatrick, Christine – EDUCAUSE Quarterly, 2006
At the beginning of an academic year, thousands of students move into campus housing on Indiana University's Bloomington and Indianapolis campuses within a three-day period, and more than 96 percent arrive with at least one personal computer (and possibly also a PDA, cell phone, and gaming system), and most expect to connect to the campus network…
Descriptors: Computer Networks, Student Personnel Services, Information Technology, Computer Security
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks

Direct link
