Publication Date
| In 2026 | 0 |
| Since 2025 | 56 |
| Since 2022 (last 5 years) | 373 |
| Since 2017 (last 10 years) | 645 |
| Since 2007 (last 20 years) | 1197 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Hudomalj, Emil; Jauk, Avgust – Program: Electronic Library and Information Systems, 2006
Purpose: To give an overview of the current state and trends in authentication and authorisation in satisfying academic library users' mobility and instant access to digital information resources, and to propose that libraries strongly support efforts to establish a global authentication and authorisation infrastructure.…
Descriptors: Academic Libraries, Library Services, Access to Information, Computer Security
Howell, Kevin R. – Techniques: Connecting Education and Careers, 2006
This article features an assistant professor of technology who shares his story of near disaster and offers advice for others about protecting their data. The author presents steps that can be taken to prevent unexpected events from destroying data. The author strongly recommends using backup files as a way of securing computer files and data.…
Descriptors: Computer Security, Data, Computer Software, Computer Peripherals
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes how academic lobbyists are trying to decide whether to back a proposed bill that might shield universities from getting sued for electronic piracy, or to fight for a better deal. (EV)
Descriptors: Computer Security, Federal Legislation, Higher Education, Legal Responsibility
Wodarz, Nan – School Business Affairs, 1997
The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…
Descriptors: Computer Networks, Computer Security, Elementary Secondary Education, Internet
Peer reviewedBar-Ilan, Judit – Electronic Library, 1996
Discusses some basic notions of modern cryptography: public key systems and digital signatures. Describes how theoretical modern cryptography can help solve security problems on the Internet. (Author/JKP)
Descriptors: Coding, Computer Security, Computer System Design, Cryptography
Peer reviewedFrazier, Max K. – Educational Leadership, 1995
Like other technologies, the Internet is vulnerable to misuse by hostile individuals (flamers), sexual predators, and pornographers. Schools can shield students from these negative influences by using LinQ, a new product that restricts access to certain inappropriate Internet areas. Technology codes of conduct and staff development are alternative…
Descriptors: Computer Security, Elementary Secondary Education, Guidelines, Pornography
Peer reviewedFalk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Peer reviewedBuck, S. Peter – Internet Research, 1996
Discussion of use of the Internet for online payments focuses on payment mechanisms for conducting transactions. Highlights include commercial requirements; security requirements; various proposed and currently used mechanisms; and future possibilities. (LRW)
Descriptors: Banking, Computer Security, Futures (of Society), Internet
Peer reviewedRatnasingham, Pauline – Internet Research, 1998
Introduces the new concept of trust and how it influences the process of managing the security of an organization operating in an electronic commerce environment. Theoretically, the study aims to develop a framework of trust and security to provide a set of guidelines for secure electronic commerce. (Author/LRW)
Descriptors: Computer Security, Guidelines, Organizational Climate, Organizational Theories
Goldsborough, Reid – School Planning & Management, 2000
Describes the use of personal firewall software to help schools ward off computer hackers. Several firewall software options are highlighted. (GR)
Descriptors: Computer Security, Computer Software, Elementary Secondary Education, Public Schools
Peer reviewedBroderick, Martha A.; Gibson, Virginia R.; Tarasewich, Peter – Internet Research, 2001
In the United States, electronic signatures recently became as legally binding as printed signatures. Reviews the status of electronic signatures in the United States, and compares it to work done by the United Nations. Summarizes the technology that can be used to implement electronic signatures. Discusses problems and open issues surrounding the…
Descriptors: Computer Security, Federal Legislation, Information Technology, Laws
Balas, Janet L. – Computers in Libraries, 2005
Although some people feel that there should be no expectation of privacy in a library because it is a public place, the debate on the library's obligation to protect patron privacy continues. Despite the media attention given to some notorious breaches of privacy (for example, the hacking of Paris Hilton's electronic address book), and the…
Descriptors: Privacy, Public Libraries, Computer Security, Federal Legislation
Goldsborough, Reid – Black Issues in Higher Education, 2004
There's no question about it: Spam is a scourge. This ever-increasing torrent of unsolicited commercial mass e-mail saps productivity and, for some, threatens the very viability of e-mail. The battle against spam, unfortunately, is creating problems of its own, with people sometimes unable to send legitimate e-mail and other times unable to…
Descriptors: Internet, Electronic Mail, Computer Mediated Communication, Computer Security
Johnson, Doug – School Administrator, 2004
We've experienced Generation X and Generation Y. Now Generation Wi-Fi is making its presence known in many schools. Today's students are connected with each other and the world, increasingly through personally owned communication technologies. Cell phones that send text messages and photographs, handheld personal digital assistants that can beam…
Descriptors: Computers, Telecommunications, Computer Uses in Education, Computer Security
Peer reviewedWalery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security

Direct link
