Additional+Resources+and+References

References:
Business Software Alliance (2011). What is Software Piracy? Retrieved from : [|http://www.bsa.org/Piracy Portal.aspx]

Endicott-Popovsky, B. (2009). Seeking a Balance: Online Safety for Children. //Teacher Librarian//, 37(2), 29-34.

Garland, V.E. (2009). Emerging Technology Trends and Ethical Practices for the School Principal. //Journal of Educational Technology Systems,// 38 (1), 39-50.

Hall, D. (Year not listed). Copyright and Fair Use Guidelines for Teachers. Retrieved from:[| http://www.mediafestival.org/copyrightchart.html]

Intel Corporation (2011). Asset Protection: Intel Anti Theft Technology (Intel AT) for Laptop Security. Retrieved from: []

Kinney, M. (2011). Data Privacy day is here. How will you promote it. //Second Nature: The Cyber Security Blog//. Retrieved from: []

Microsoft Corporation (2011). Protect Yourself from Piracy. Retrieved from: []

National Academy of Sciences (2003). //Filtering//. NetSafe Kids. Retrieved from: []

National Center for Missing and Exploited Children (2010). //Revealing Too Much//. NetSmartz. Retrieved from: [|http://netsmartz.org/Revealing Too Much]

Nicholson, M.I. (2011). How to Protect Data on your Computer. //Ezine Articles//. Retrieved from: []

No Author named (2008). Internet Filtering Software: What Does it Do? //Parental Control Guides//. Retrieved from: []

Shannon, R. (2010). Passwords. //HTML Source.// Retrieved from: []

Szuba, T. (1998). Safeguarding Your Technology: Practical Guidelines for Electronic Education Information Security. U.S. department of Education National Center for Education Statistics. Retrieved from [|http://nces.ed.gov/pubs 98/98297.pdf]

Additional Resources:
[|How to Prevent Computer Viruses | eHow.com] [] [] [] [] [] []

Home Page