Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Peer reviewedOravec, Jo Ann – Business Education Forum, 2000
Risk management training cannot prevent hazards, but can help students learn to deal with them more efficiently. A risk-assessment and risk-communication approach to dealing with computer problems can be applied in the business classroom. (JOW)
Descriptors: Business Education, Computer Security, Risk Management, Training
Peer reviewedLambert, Joyce C.; Lousteau, Carolyn L.; Mochetta, Page T. – T.H.E. Journal, 2001
Discusses the security of computerized test files based on a survey of collegiate educators and offers recommendations to make tests more secure. Highlights include passwords; firewalls; keeping test files offline rather than on a hard drive; encryption; and using software to write over files rather than just deleting them. (LRW)
Descriptors: Computer Security, Computer Software, Higher Education, Surveys
Goldsborough, Reid – Black Issues in Higher Education, 2004
Identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. People do get scammed. Phishing messages that appear to be sent by trusted companies dupe 3 percent of the people who receive…
Descriptors: Credit (Finance), Internet, Computer Security, Crime Prevention
Reynolds, Ben – Technology & Learning, 2005
"Sleazeware" is the authors' term for spyware, adware, malware, trackware, foistware, trojans, and other programs that sleaze into computers, either as a hidden component or by tricking someone into downloading them. Once in the machine, the program phones home for purposes ranging from simply reporting where people browse to downloading…
Descriptors: Information Retrieval, Internet, Privacy, Computer Security
Peer reviewedGoldsborough, Reid – Teacher Librarian, 2005
Many people still have not heard about the many ways identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. The tricksters are getting trickier. One of the newest scares involves…
Descriptors: Internet, Deception, Computer Security, Crime
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
Breeding, Marshall – Computers in Libraries, 2005
Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…
Descriptors: Libraries, Internet, Computer Networks, Computer Security
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
US Department of Homeland Security, 2009
The overarching goal of the National Infrastructure Protection Plan (NIPP) is to build a safer, more secure, and more resilient America by preventing, deterring, neutralizing, or mitigating the effects of deliberate efforts by terrorists to destroy, incapacitate, or exploit elements of our Nation's critical infrastructure and key resources (CIKR)…
Descriptors: National Security, Resources, Terrorism, Natural Disasters
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Waters, John K. – T.H.E. Journal, 2007
Information technology (IT) departments are ruled by a kind of Maslow's Hierarchy of Needs: The big-tech stuff--the operating systems, the networks, the data centers--gets the priority, food-and-shelter attention, while upgrading the backup power supplies, evaluating new projector mounts, and taming that rat's nest of classroom cords fall…
Descriptors: Educational Technology, Information Technology, Computer Networks, Computer Security
MacFarlane, Maureen A. – School Administrator, 2007
The widespread use of virtual classrooms, Internet exploration and chat rooms has stretched the concept of the schoolhouse while the popularity of social networking sites, blogging and text messaging have affected the way students communicate with and about each other, their teachers, school administrators, and their schools. Add to the mix…
Descriptors: Educational Strategies, Internet, Computer Security, Child Safety
Fischman, Josh – Chronicle of Higher Education, 2007
The Internet has great difficulty coping with the sharp increase in mobile devices like cellphones and laptops, and handling bandwidth-hungry traffic such as video, now demanded by an increasing number of users. According to Ellen W. Zegura, chairwoman of computer sciences at the Georgia Institute of Technology, the Internet is like a big…
Descriptors: Internet, Technological Advancement, Computer Science, Computer Security
Kohlmeyer, James M., III – Journal of College Teaching & Learning, 2008
While it is important for accounting information systems (AIS) students to understand computer technology, internal controls and business processes, such knowledge is of little use without reference to appropriate contexts. Integrating Wall Street Journal (WSJ) readings and discussions into AIS classes can enrich learning by stimulating…
Descriptors: Information Systems, Context Effect, Curriculum Enrichment, Case Method (Teaching Technique)
Nackerud, Shane; Scaletta, Kurtis – New Directions for Student Services, 2008
Blogs are a hot topic in academia. A search on "blog" in the "Chronicle of Education's" Web site returns nearly two hundred articles, covering such topics as the dangers an impolitic blog can do to an institution's leaders (Read, 2006) or the blogger's career (Tribble, 2005) and the mutual use of blogs by instructors to lambaste students (Lipka,…
Descriptors: Higher Education, Web Sites, Electronic Publishing, College Libraries

Direct link
