Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 7 |
Computers | 7 |
Crime Prevention | 7 |
Information Technology | 4 |
Internet | 4 |
Computer Software | 3 |
Vandalism | 3 |
Community Colleges | 2 |
Crime | 2 |
Privacy | 2 |
Safety | 2 |
More ▼ |
Source
Computers in Libraries | 1 |
National Clearinghouse for… | 1 |
ProQuest LLC | 1 |
T.H.E. Journal | 1 |
TechTrends: Linking Research… | 1 |
Author
Belon, Barbara | 1 |
Descy, Don E. | 1 |
Huang, Phil | 1 |
Miles, Tracy L. | 1 |
Schneider, Tod | 1 |
Sturgeon, Julie | 1 |
Wright, Marie | 1 |
Publication Type
Reports - Descriptive | 5 |
Journal Articles | 3 |
Collected Works - Proceedings | 1 |
Dissertations/Theses -… | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Audience
Media Staff | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Schneider, Tod – National Clearinghouse for Educational Facilities, 2010
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Descriptors: School Security, Information Technology, Safety, School Personnel
Miles, Tracy L. – ProQuest LLC, 2009
One of the most significant challenges faced by government officials today is securing information systems to make them more resilient to attack from increasingly complex challenges from cyber-criminals, state-sponsored groups, and other threats. Over the years, the federal government has developed and implemented Certification and Accreditation…
Descriptors: Information Systems, Information Technology, Federal Government, Accreditation (Institutions)
Sturgeon, Julie – T.H.E. Journal, 2008
Acting on information from students who reported seeing a classmate looking at inappropriate material on a school computer, school officials used forensics software to plunge the depths of the PC's hard drive, searching for evidence of improper activity. Images were found in a deleted Internet Explorer cache as well as deleted file space.…
Descriptors: Computer Software, Computers, Internet, School Safety
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
A computer virus is defined as a software program capable of reproducing itself and usually capable of causing great harm to files or other programs on the same computer. The existence of computer viruses--or the necessity of avoiding viruses--is part of using a computer. With the advent of the Internet, the door was opened wide for these…
Descriptors: Computers, Computer Security, Crime Prevention, Internet
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
American Association of Community Colleges, Washington, DC. – 2002
The education and training of the cybersecurity workforce is an essential element in protecting the nation's computer and information systems. On June 26-28, 2002, the National Science Foundation supported a cybersecurity education workshop hosted by the American Association of Community Colleges. The goals of the workshop were to map out the role…
Descriptors: Community Colleges, Computer Security, Computers, Crime
Belon, Barbara; Wright, Marie – 2002
This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…
Descriptors: College Curriculum, College Instruction, Community Colleges, Computer Science