Publication Date
In 2025 | 0 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 17 |
Since 2016 (last 10 years) | 39 |
Since 2006 (last 20 years) | 162 |
Descriptor
Source
Author
Fain, Terry | 5 |
Sehgal, Amber | 5 |
Turner, Susan | 5 |
Schneider, Tod | 4 |
Stover, Del | 4 |
Descy, Don E. | 3 |
Kennedy, Mike | 3 |
Ashford, Tina | 2 |
Carlson, Scott | 2 |
Carr, Joetta L. | 2 |
Donovan, Erin | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 46 |
Administrators | 33 |
Teachers | 23 |
Policymakers | 18 |
Community | 6 |
Media Staff | 4 |
Parents | 2 |
Researchers | 2 |
Support Staff | 2 |
Students | 1 |
Location
California | 15 |
New Jersey | 13 |
United States | 8 |
Florida | 6 |
United Kingdom | 5 |
Virginia | 5 |
Australia | 4 |
Canada | 4 |
Michigan | 4 |
Minnesota | 4 |
Oregon | 4 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
General Educational… | 1 |
Schools and Staffing Survey… | 1 |
What Works Clearinghouse Rating
Schneider, Tod – National Clearinghouse for Educational Facilities, 2010
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Descriptors: School Security, Information Technology, Safety, School Personnel
Cornell, Dewey – Change: The Magazine of Higher Learning, 2010
In 2007, the landscape of campus safety changed abruptly with the Virginia Tech shooting and the subsequent wave of anonymous threats in colleges across the country. In response to the tragedy, the Virginia state legislature mandated that every public institution of higher education establish a "threat assessment team." Both the FBI and the U.S.…
Descriptors: School Safety, Emergency Programs, Crisis Management, Higher Education
Dervarics, Charles – Diverse: Issues in Higher Education, 2010
This article reports on the legislation proposed by Senator Jim Webb which authorizes a blue-ribbon commission of experts who would undertake an 18-month review of the nation's criminal justice system, including issues such as the disproportionate share of minorities--particularly African-Americans--in the U.S. prisons. Webb said that the U.S. has…
Descriptors: Delinquency, Correctional Institutions, Juvenile Justice, Correctional Rehabilitation
Shushok, Frank, Jr. – About Campus, 2010
Everyone at some point has asked the question "Why do bad things happen to good people? Even while asking it, most know that finding an answer to this question is not likely in their future. People's best responsible action, then, is to manage their risks to prevent future bad things from occurring, to the greatest extent possible. Risk…
Descriptors: Risk Management, Higher Education, Campuses, Colleges
Williamson, Ronald – Education Partnerships, Inc., 2012
Cyberbullying has emerged as one of the fastest growing issues faced by school leaders. It involves the use of technology to bully another person and can occur through the use of e-mail, instant messaging or texting, blogs, postings on websites, or through social media. The most common definition of cyberbullying is that it includes repeated,…
Descriptors: Aggression, Bullying, Internet, Web Sites
New Jersey Department of Education, 2017
This report presents information provided by New Jersey public schools for the 2015-16 school year on incidents of violence; vandalism; weapon offenses; substance offenses; and harassment, intimidation, and bullying (HIB). The information is presented annually by the New Jersey Department of Education (NJDOE) to the Governor and Legislature to…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
Carlin, Anna; Manson, Daniel P.; Zhu, Jake – Information Systems Education Journal, 2010
With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…
Descriptors: Computer Security, Crime Prevention, Computer Networks, Specialization
Waters, John K. – T.H.E. Journal, 2009
In December, Microsoft announced a major security flaw affecting its Internet Explorer web browser. The flaw allowed hackers to use hidden computer code they had already injected into legitimate websites to steal the passwords of visitors to those sites. Reportedly, more than 10,000 websites were infected with the destructive code by the time…
Descriptors: Internet, School Districts, Computer Software, Web Sites
Fredrick, Kathy – School Library Media Activities Monthly, 2009
A basic definition of "cyberbullying" is provided by Nancy Willard, director of the Center for Safe and Responsible Internet Use. She has defined cyberbullying as using the Internet or other mobile devices to send or post harmful or cruel text or images to bully others. The advent of social networking has highlighted cyberbullying. Library media…
Descriptors: Media Specialists, Internet, Library Role, Bullying
Viadero, Debra – Education Week, 2009
A decade after Eric D. Harris and Dylan B. Klebold fatally gunned down 13 people and wounded 23 others at Columbine High School, researchers are still sifting for answers to questions raised by the elaborate and notorious attack. Books and studies being published to coincide with the 10th anniversary of the April 20, 1999, massacre at the…
Descriptors: Violence, School Safety, Adolescents, Weapons
Franzosa, Alyssa – New England Journal of Higher Education, 2009
On April 16, 2007, Seung-Hui Cho traded in his title as "student" for one of "gunman." That day, Cho, a student at Virginia Tech, was responsible for the deadliest shooting spree by a single person in U.S. history, killing 33 people, including himself. Ten months later on Valentine's Day, Steven Kazmierczak joined Cho in the…
Descriptors: Higher Education, Campuses, Safety, College Faculty
Data Quality Campaign, 2011
Under security breach response laws, businesses--and sometimes state and governmental agencies--are required to inform individuals when the security, confidentiality or integrity of their personal information has been compromised. This resource provides a state-by-state analysis of security breach response laws. [The Data Quality Campaign has…
Descriptors: State Legislation, Federal Legislation, Laws, Information Security
Diamanduros, Terry; Downs, Elizabeth – Library Media Connection, 2011
Technology has changed the school yard or neighborhood bully. It no longer requires physical intimidation to be a bully. In fact, bullying can be done anonymously, on or off campus, and physical size does not enter into the scenario. Every year headlines identify children who take their own lives as a result of being victims of various forms of…
Descriptors: Bullying, School Libraries, Educational Technology, Media Specialists
Fuentes, Annette – Rethinking Schools, 2012
Supposedly designed to improve student attendance, the aggressive truancy policing in Los Angeles (LA) has discouraged students from going to class and often pushes them to drop out and into harm's way. Truancy tickets play a role in the school-to-prison pipeline. Students are being brought up in an environment that is a pre-prisoning of youth. LA…
Descriptors: Truancy, Attendance, Justice, Zero Tolerance Policy
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2009
Privacy is a thing of the past. Monitoring is everywhere. If one is looking at this online, the author is sure that lots of information has been stored and linked to anyone about that action. Nevertheless, at least people can try to play with "their" minds and surf the web anonymously. In this article, the author discusses ways to try to hide…
Descriptors: Internet, Computer Mediated Communication, Privacy, Computer Security