Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 3 |
| Elementary Secondary Education | 3 |
| Information Networks | 3 |
| Computer Networks | 2 |
| Information Security | 2 |
| Privacy | 2 |
| Budgets | 1 |
| Compliance (Legal) | 1 |
| Computer Mediated… | 1 |
| Computer Software | 1 |
| Computer System Design | 1 |
| More ▼ | |
Publication Type
| Reports - Descriptive | 2 |
| Dissertations/Theses -… | 1 |
| Guides - General | 1 |
| Journal Articles | 1 |
Education Level
| Elementary Secondary Education | 1 |
| Kindergarten | 1 |
Audience
| Administrators | 1 |
| Parents | 1 |
| Policymakers | 1 |
Location
| California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Littman, Marlyn Kemper – Journal of Online Learning, 1998
Explores capabilities of extranets (collaborative information networks between partner institutions) from the perspective of the school and university environment. Introduces distinctive features. Presents strategies and techniques for facilitating the extranet design and implementation process and delineates tactics for safeguarding extranets…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Direct link
