In five pages this paper examines school security in terms of how technology is used. Ten sources are cited in the bibliography.