Publication Date
In 2025 | 1 |
Since 2024 | 3 |
Since 2021 (last 5 years) | 11 |
Since 2016 (last 10 years) | 29 |
Since 2006 (last 20 years) | 76 |
Descriptor
Vandalism | 308 |
Crime | 91 |
Violence | 83 |
Elementary Secondary Education | 64 |
Stealing | 49 |
Prevention | 46 |
Crime Prevention | 42 |
Public Schools | 37 |
School Security | 36 |
School Safety | 35 |
Discipline | 33 |
More ▼ |
Source
Author
Phillips, G. Howard | 4 |
Allen, Rodney F., Ed. | 3 |
Bayh, Birch | 3 |
Kennedy, Mike | 3 |
Lorenzen, Michael | 3 |
Stover, Del | 3 |
Brekke, Norman R. | 2 |
Clark, Roger N. | 2 |
Huerta, Adrian H. | 2 |
Lazarine, Dianne | 2 |
Libby, Thomas J. | 2 |
More ▼ |
Publication Type
Education Level
Audience
Practitioners | 20 |
Administrators | 8 |
Policymakers | 6 |
Media Staff | 4 |
Students | 3 |
Teachers | 3 |
Researchers | 2 |
Community | 1 |
Parents | 1 |
Support Staff | 1 |
Location
New Jersey | 15 |
Ohio | 6 |
Australia | 4 |
California | 4 |
Canada | 4 |
United States | 4 |
Florida | 3 |
Germany | 3 |
Illinois | 3 |
Nigeria | 3 |
Arizona | 2 |
More ▼ |
Laws, Policies, & Programs
Safe and Drug Free Schools… | 4 |
Individuals with Disabilities… | 2 |
Crime Awareness and Campus… | 1 |
Elementary and Secondary… | 1 |
Assessments and Surveys
ACT Assessment | 1 |
Core Alcohol and Drug Survey | 1 |
Marlowe Crowne Social… | 1 |
School Survey on Crime and… | 1 |
Schools and Staffing Survey… | 1 |
What Works Clearinghouse Rating
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Jorgensen, J. Normann – International Journal of Multilingualism, 2008
Graffiti constitutes a medium through which the youth express opposition to authorities, as well as desires, dreams, and hopes. Graffiti shows many of the linguistic characteristics of youth language, including playfulness and, first and foremost, polylingual languaging. Graffiti in almost every city, at least in Europe, uses English and one or…
Descriptors: Foreign Countries, North Americans, Urban Areas, Power Structure
Moles, Oliver C. – 1987
This paper examines national data from the early 1970s to the mid 1980s in order to identify trends in student and teacher victimization in schools. All the student and teacher victimization data reviewed in this paper contradict the notion of a progressive worsening of the school crime problem. Assault statistics showed little change, robberies…
Descriptors: Antisocial Behavior, Crime, Delinquency, Educational Environment
Coppock, Nan – 1973
School security encompasses a larger area than it did a decade ago. Whereas it used to imply the need to provide a safe educational environment for students, it now connotes the protection of all school personnel, facilities, and equipment. Moreover, the concern in school security has moved from accidental to deliberate losses. The single greatest…
Descriptors: Community Involvement, Crime, Educational Administration, Literature Reviews
Turner, Edward T.; Williams, H. Preston – Journal of Health, Physical Education and Recreation, 1973
This article presents a research study on who is stealing bound copies of physical education materials and why they do it. (JA)
Descriptors: Books, Libraries, Physical Education, Stealing

Davis, Donna G. – College and Research Libraries, 1971
Although there have been only scattered incidents of arson and vandalism in academic libraries, the number of such incidents has increased recently. Specific incidents are discussed with suggestions on how security may be improved. (Author/NH)
Descriptors: College Libraries, Security, Students, Vandalism
Sager, Don – Libr J, 1969
Descriptors: Libraries, Library Equipment, Prevention, Stealing

Furnell, Steven M.; Warren, Matthew J. – Internet Research, 1997
Computing and telecommunications, key to an information-based society, are increasingly targets for criminals and mischief makers. This article examines the effects of malicious computer abuse: hacking and viruses, highlights the apparent increase in incidents, and examines their effect on public perceptions of technology. Presents broad…
Descriptors: Behavior Problems, Computers, Criminals, Telecommunications
Epstein, Joel; Finn, Peter – 1996
This bulletin provides suggestions for the components of a comprehensive approach to reducing student vandalism on college and university campuses. Numerous facets of the problem are addressed, including: the association of binge drinking with vandalism and school policies that tolerate or even facilitate binge drinking; a school's drinking…
Descriptors: Alcohol Education, Antisocial Behavior, Counseling, Drinking
Kiernan, Owen B. – 1975
The speaker notes the rise in the rate of violence and vandalism in the schools and cites a poll indicating how important secondary school principals think the problem is. He lists a number of factors contributing to school crime--the breakdown of the family and family control, glamorization of violence on television and film, street crime, drug…
Descriptors: Crime, Delinquency, Elementary Secondary Education, Vandalism
Furno, O. F.; Wallace, L.B. – American School and University, 1972
Outlines ways used by cities across the nation to fight increased school vandalism. (Author)
Descriptors: Costs, Lighting, Parent Responsibility, School Security

Swaffer, Tracey; Hollin, Clive R. – Journal of Adolescence, 1995
Previous methods of classifying motives for firesetting into categories such as "revenge" and "excitement" have been criticized for their failure to reflect the heterogeneity of firesetting. In this study, 17 young firesetters were interviewed. In keeping with previous studies, six distinct groups emerged. Implications for…
Descriptors: Adolescents, Behavior Disorders, Crime, Delinquency
Reynolds, Ben – Technology & Learning, 2005
"Sleazeware" is the authors' term for spyware, adware, malware, trackware, foistware, trojans, and other programs that sleaze into computers, either as a hidden component or by tricking someone into downloading them. Once in the machine, the program phones home for purposes ranging from simply reporting where people browse to downloading…
Descriptors: Information Retrieval, Internet, Privacy, Computer Security
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software