LEADER 03845oam 2200661I 450 001 9910465456603321 005 20200520144314.0 010 $a0-203-09621-5 010 $a1-299-27920-1 010 $a1-136-21735-5 024 7 $a10.4324/9780203096215 035 $a(CKB)2560000000099229 035 $a(EBL)1143733 035 $a(OCoLC)830161362 035 $a(SSID)ssj0000833007 035 $a(PQKBManifestationID)11476937 035 $a(PQKBTitleCode)TC0000833007 035 $a(PQKBWorkID)10935630 035 $a(PQKB)11047828 035 $a(MiAaPQ)EBC1143733 035 $a(Au-PeEL)EBL1143733 035 $a(CaPaEBR)ebr10672672 035 $a(CaONFJC)MIL459170 035 $a(OCoLC)839778054 035 $a(EXLCZ)992560000000099229 100 $a20180706d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCyber security for educational leaders $ea guide to understanding and implementing technology policies /$fRichard Phillips and Rayton R. Sianjina 210 1$aNew York :$cRoutledge,$d2013. 215 $a1 online resource (165 p.) 300 $aDescription based upon print version of record. 311 $a0-415-63197-1 311 $a0-415-63196-3 320 $aIncludes bibliographical references and index. 327 $aCover; Cyber Security for Educational Leaders; Title Page; Copyright Page; Table of Contents; Preface; ELCC Elements and Related Chapters; Matrix ELCC Elements and Related Chapters; Acknowledgments; Chapter 1: Introduction; Chapter 2: Total Cost of Ownership; Chapter 3: Acceptable Use Policy; Chapter 4: Authentication Policy; Chapter 5: Internet-Use Policy; Chapter 6: Access Policy; Chapter 7: Auditing Policy; Chapter 8: Physical Policy; Chapter 9: Analysis Policy; Chapter 10: Privacy Policy; Chapter 11: Cyber Risk Assessment Checklist Profile and Questionnaire 327 $aChapter 12: Electronic BullyingChapter 13: Electronic Sexual Harassment; Chapter 14: Basics of Copyright and Fair Use; Glossary; References; Index 330 $a"As leaders are increasingly implementing technologies into their districts and schools, they need to understand the implications and risks of doing so. Cyber Security for Educational Leaders is a much-needed text on developing, integrating, and understanding technology policies that govern schools and districts. Based on research and best practices, this book discusses the threats associated with technology use and policies and arms aspiring and practicing leaders with the necessary tools to protect their schools and to avoid litigation.Special Features:A Cyber Risk Assessment Checklist and Questionnaire helps leaders measure levels of risk in eight vital areas of technology usage. Case vignettes illuminate issues real leaders have encountered and end-of-chapter questions and activities help readers make connections to their own practice.Chapter alignment with the ELCC standards.An entire chapter on Copyright and Fair Use that prepares leaders for today's online world.A Companion Website with additional activities, assessment rubrics, learning objectives, and PowerPoint slides. "--$cProvided by publisher. 606 $aEducational technology$xSecurity measures 606 $aCyberspace$xSecurity measures 606 $aComputer security 608 $aElectronic books. 615 0$aEducational technology$xSecurity measures. 615 0$aCyberspace$xSecurity measures. 615 0$aComputer security. 676 $a371.33 700 $aPhillips$b Richard$f1958-,$0847038 702 $aSianjina$b Rayton R. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910465456603321 996 $aCyber security for educational leaders$91892212 997 $aUNINA