Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 18 |
Descriptor
Crime Prevention | 42 |
Vandalism | 42 |
Crime | 24 |
Violence | 15 |
School Safety | 14 |
Victims of Crime | 13 |
Computer Security | 12 |
Criminals | 12 |
Aggression | 11 |
Discipline | 11 |
Guidelines | 11 |
More ▼ |
Source
Author
Adams, Shawn | 1 |
Arterburn, Tom R. | 1 |
Beaudin, James A. | 1 |
Boss, Richard W. | 1 |
Brown, Scott | 1 |
Cardinali, Richard | 1 |
Carlson, Scott | 1 |
Carter, Sherry Plaster | 1 |
Cervera, Amparo | 1 |
Cohen, Andrew | 1 |
Cuadrado, Manuel | 1 |
More ▼ |
Publication Type
Education Level
Elementary Secondary Education | 5 |
Higher Education | 2 |
High Schools | 1 |
Postsecondary Education | 1 |
Location
New Jersey | 9 |
California | 2 |
United States | 2 |
United Kingdom | 1 |
Laws, Policies, & Programs
Safe and Drug Free Schools… | 4 |
Assessments and Surveys
What Works Clearinghouse Rating
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Sellke, Sarah H. – ProQuest LLC, 2010
Internet security attacks have drawn significant attention due to their enormously adverse impact. These attacks includes Malware (Viruses, Worms, Trojan Horse), Denial of Service, Packet Sniffer, and Password Attacks. There is an increasing need to provide adequate defense mechanisms against these attacks. My thesis proposal deals with analytical…
Descriptors: Internet, Computer Security, Crime Prevention, Technical Support
New Jersey Department of Education, 2018
This report presents information provided by New Jersey public schools for the 2016-17 school year on incidents of violence; vandalism; weapon offenses; substance offenses; and harassment, intimidation, and bullying (HIB). The information is presented annually by the New Jersey Department of Education (NJDOE) to the Governor and Legislature to…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
Schneider, Tod – National Clearinghouse for Educational Facilities, 2010
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Descriptors: School Security, Information Technology, Safety, School Personnel
New Jersey Department of Education, 2017
This report presents information provided by New Jersey public schools for the 2015-16 school year on incidents of violence; vandalism; weapon offenses; substance offenses; and harassment, intimidation, and bullying (HIB). The information is presented annually by the New Jersey Department of Education (NJDOE) to the Governor and Legislature to…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
Perez, Carmen; Cuadrado, Manuel; Cervera, Amparo – Journal of Academic Librarianship, 2009
This paper analyses university library users' attitudes towards book vandalism in order to develop a basis for intervention. Using a customer oriented approach data was collected from users who attended an academic library exhibition on vandalized books at a University campus. Respondents were asked both for their reactions to the vandalism as…
Descriptors: Vandalism, Books, College Libraries, Universities
New Jersey Department of Education, 2015
This report presents information provided by New Jersey public schools for the 2014-15 school year on incidents of violence; vandalism; weapon offenses; substance offenses; and harassment, intimidation, and bullying (HIB). The information is presented annually by the New Jersey Department of Education (NJDOE) to the Governor and Legislature to…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
New Jersey Department of Education, 2014
This report presents information reported by New Jersey public schools on incidents of violence, vandalism, weapons, and substance abuse offenses. It also includes information on harassment, intimidation, and bullying (HIB) for the 2013-14 school year. The information is presented annually by the New Jersey Department of Education (NJDOE) to the…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services
New Jersey Department of Education, 2013
The Commissioner's annual report provides the Governor and Legislature with information reported by school districts concerning incidents of serious student misconduct grouped into the following five major reporting categories: violence; vandalism; harassment, intimidation and bullying (HIB); weapons; and substance abuse. An analysis of trends…
Descriptors: Weapons, Charter Schools, Substance Abuse, Violence
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
American Libraries, 1983
Presents responses of five major bibliographic facilities--Library of Congress MARC program, Online Computer Library Center (OCLC), Research Libraries Information Network (RLIN), Washington Library Network (WLN), and University of Toronto Library Automated System (UTLAS)--to a set of fictional situations involving computer crime and security. (EJS)
Descriptors: Crime, Crime Prevention, Databases, Emergency Programs