NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Arling, Priscilla A. – Journal of Information Systems Education, 2009
One way to bring concepts to life in an introductory data networks course is for students to physically build a network that addresses a real business problem. However it can be challenging to find a suitable business problem, particularly if the network can exist only during the class period. This case presents a realistic business scenario and…
Descriptors: Information Technology, Internet, Computer Networks, Teamwork
Peer reviewed Peer reviewed
Direct linkDirect link
Schoedel, Eric – EDUCAUSE Quarterly, 2009
Uninterrupted, high-bandwidth network connectivity is crucial for higher education. Colleges and universities increasingly adopt gigabit wireless solutions because of their fiber-equivalent performance, quick implementation, and significant return on investment. For just those reasons, Rush University Medical Center switched from free space optics…
Descriptors: Computer Networks, Telecommunications, Statewide Planning, Technology Planning
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cesarini, Lisa McHugh; Cesarini, Paul – Journal of Technology Studies, 2008
When Lars Ulrich, drummer for the rock group Metallica, testified before Congress about his group's lawsuit against Napster in 2000, many people who followed copyright issues in the music industry were not surprised (Ulrich, 2000). Ever since downloading audio files became as easy as clicking a few buttons on a personal computer, charges of…
Descriptors: Higher Education, Legal Problems, Music, Copyrights
Peer reviewed Peer reviewed
Direct linkDirect link
Dolan, Jon; Pederson, Curt – EDUCAUSE Quarterly, 2004
Oregon State University's demand for bandwidth to support scientific collaboration and research continues to grow exponentially, while state funding declines due to hard economic times. The challenge faced by these authors was to find creative yet fiscally responsible ways to meet OSU's bandwidth demands. Looking at their options for high-capacity…
Descriptors: Internet, Information Transfer, Synchronous Communication, Computer Networks
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering