Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 4 |
| Computer Uses in Education | 4 |
| Crime | 4 |
| Computer Mediated… | 3 |
| Internet | 3 |
| Foreign Countries | 2 |
| Access to Information | 1 |
| At Risk Persons | 1 |
| Attitude Measures | 1 |
| Computer Software | 1 |
| Copyrights | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 4 |
| Reports - Descriptive | 3 |
| Reports - Evaluative | 1 |
Education Level
| Elementary Secondary Education | 1 |
Audience
Location
| United Kingdom | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
| Trends in International… | 1 |
What Works Clearinghouse Rating
Ramaswami, Rama – T.H.E. Journal, 2010
Schools fear the predatory behavior that lurks around social networking sites, where the exchange of personal information can make users sitting ducks for hackers, thieves, cyberbullies, and scammers. So they're caught in what appears to be an all-or-nothing choice: take advantage of the academic opportunities that social networking sites can…
Descriptors: Internet, Social Networks, Safety, Computer Security
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Peer reviewedJackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Hope, Andrew – British Educational Research Journal, 2006
Internet access has recently been introduced into over 30,000 schools in the UK. While web provision has been heralded by some as an educational panacea, it is also recognised that there are dangers inherent in school Internet use. Adopting the cultural risk perspective, drawing upon a social-cultural analysis of Internet regulation and utilising…
Descriptors: Foreign Countries, Internet, At Risk Persons, Pornography

Direct link
