Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 3 |
| Since 2007 (last 20 years) | 3 |
Descriptor
| Computer Security | 7 |
| Staff Development | 7 |
| Information Security | 3 |
| Computer Uses in Education | 2 |
| Educational Technology | 2 |
| Ethics | 2 |
| Knowledge Level | 2 |
| School Personnel | 2 |
| Technology Integration | 2 |
| Administrator Responsibility | 1 |
| Administrators | 1 |
| More ▼ | |
Source
| ProQuest LLC | 2 |
| American School Board Journal | 1 |
| Cogent Education | 1 |
| Learning & Leading with… | 1 |
| Staff and Educational… | 1 |
Author
| Bailey, Gerald D. | 2 |
| Abdulfattah Omar | 1 |
| Ahmed Al Zaidy | 1 |
| Benson, Allen C. | 1 |
| Jonathan Hobbs | 1 |
| Pownell, David | 1 |
| Tahani Abdullah Abdurhman… | 1 |
| Vondracek, Mark | 1 |
| Waheed M. A. Altohami | 1 |
Publication Type
| Journal Articles | 4 |
| Dissertations/Theses -… | 2 |
| Guides - Non-Classroom | 2 |
| Reports - Descriptive | 2 |
| Books | 1 |
| Reports - Evaluative | 1 |
| Reports - Research | 1 |
Education Level
| Higher Education | 2 |
| Postsecondary Education | 2 |
Audience
Location
| Saudi Arabia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Jonathan Hobbs – ProQuest LLC, 2023
Cybersecurity protection remains at the forefront of many organizations' information and communication technology strategies and investments. Higher education has become a profitable target for cyber-attacks which has many institutions reevaluating their cybersecurity awareness programs. The purpose of this research was to determine the…
Descriptors: Computer Security, Information Security, Higher Education, College Faculty
Ahmed Al Zaidy – ProQuest LLC, 2020
Academic institutions hold important information about students, faculty, and staff members. Hackers target academic institutions to access this information for criminal activities such as identity theft. This study was conducted to examine information confidentiality and cybersecurity in academic institutions. It targeted employees' training…
Descriptors: Confidentiality, Information Security, Computer Security, Employees
Tahani Abdullah Abdurhman Alhumud; Abdulfattah Omar; Waheed M. A. Altohami – Cogent Education, 2023
Cybersecurity systems are crucial for safeguarding information assets across various sectors, including government, military, and commercial domains. In Saudi Arabia, cybersecurity has gained significant importance within the national security strategy, resulting in substantial investments in technologies to protect information assets, combat…
Descriptors: Information Security, Computer Security, Universities, Total Quality Management
Pownell, David; Bailey, Gerald D. – American School Board Journal, 2001
Handheld computers are just beginning to be introduced in schools. Before adopting the latest innovation, administrators must ask careful questions about issues and implications regarding leadership, teaching and learning, staff development, technology support, planning, infrastructure, safety and security, ethics, evaluation, curriculum, change,…
Descriptors: Administrator Responsibility, Computer Security, Computer Uses in Education, Elementary Secondary Education
Benson, Allen C. – 1998
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Descriptors: Computer Security, Computer Software, Computer System Design, Information Systems
Bailey, Gerald D. – Learning & Leading with Technology, 1997
School administrators consider themselves technology leaders, but few would claim they know all there is to know. This article examines 10 concepts for technology integration in 21st-century schools: change, technology planning, ethics, teaching and learning, safety and security, curriculum, staff development, infrastructure, technical support,…
Descriptors: Administrators, Change, Computer Security, Curriculum
Peer reviewedVondracek, Mark – Staff and Educational Development International, 1999
Discusses the potential of technology in classrooms, along with the problems that occur with implementing curricular changes throughout an entire school. Addresses considerations such as staff development, parent acceptance and involvement, student vandalism and overall hardware and software security, and the inclusion of technology in…
Descriptors: Computer Assisted Instruction, Computer Security, Computer Uses in Education, Curriculum Development

Direct link
