NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
National Forum on Education Statistics (ED/OERI), Washington, DC. – 2003
The purpose of this guidebook is to assist education agencies and organizations--which include state education agencies or state departments of education, school districts, and schools--in the development, maintenance, and standardization of effective Web sites. Also included is a detailed examination of the procedures necessary to provide…
Descriptors: Agencies, Computer Security, Computer Uses in Education, Educational Administration
Peer reviewed Peer reviewed
McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Peer reviewed Peer reviewed
Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Colman, Sue – Australian Universities' Review, 1997
Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…
Descriptors: Access to Information, College Administration, Computer Security, Confidentiality
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security