Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 5 |
Descriptor
Source
Computers & Education | 2 |
Information Systems Education… | 2 |
Campus Technology | 1 |
Computers in Libraries | 1 |
Educational Media… | 1 |
Information Technology and… | 1 |
International Journal of… | 1 |
Library Software Review | 1 |
Author
Beasley, William | 1 |
Beevers, C. E. | 1 |
Black, Michael | 1 |
Bonneau, Thomas | 1 |
Chapman, Debra | 1 |
Cheng, C. D. | 1 |
Christiana Karousiou | 1 |
Clark, Angela | 1 |
Combs, Joseph, Jr. | 1 |
Dobda, Kathyanne W. | 1 |
Grush, Mary | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 8 |
Book/Product Reviews | 1 |
Guides - Non-Classroom | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 3 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Cyprus | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Black, Michael; Chapman, Debra; Clark, Angela – Information Systems Education Journal, 2018
The Enhanced Virtual Laboratory (EVL) is the product of a Department of Defense grant to enhance outreach, research, and education for cyber security. Through web-based laboratories, EVL allows users to remotely experience interactive content with virtual machines inside a modern web browser providing constructivism-based, student-centered,…
Descriptors: Computer Security, Computer Simulation, Laboratories, Internet
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Ko, C. C.; Cheng, C. D. – Computers & Education, 2008
Electronic examination systems, which include Internet-based system, require extremely complicated installation, configuration and maintenance of software as well as hardware. In this paper, we present the design and development of a flexible, easy-to-use and secure examination system (e-Test), in which any commonly used computer can be used as a…
Descriptors: Computer Assisted Testing, Computers, Program Effectiveness, Examiners
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces

Nackerud, Shane A. – Information Technology and Libraries, 1998
Describes CGI (Common Gateway Interface) scripts that are available on the Web and explains how librarians can use them to make Web pages more interactive. Topics include CGI security; Perl scripts; UNIX; and HTML. (LRW)
Descriptors: Computer Interfaces, Computer Security, Gateway Systems, Library Automation

Beevers, C. E.; And Others – Computers & Education, 1995
Describes an educational experiment at Heriot-Watt University (Edinburgh, Scotland) in which 40% of the mathematics assessment for the students' first year was undertaken by a computer program. Discusses aspects of security, human-computer interface, and educational matters such as partial credit, and presents implications for the future.…
Descriptors: Academic Achievement, Computer Interfaces, Computer Managed Instruction, Computer Security
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Beasley, William; Dobda, Kathyanne W.; Wang, Lih-Ching Chen – International Journal of Instructional Media, 2005
In recent years laptop computers have become increasingly popular in educational settings; wireless connectivity is a more recent development which is only now being fully explored, and which has led to the creation of the "wireless laptop lab." In this article, the authors share some of the experiences and concerns that they have encountered…
Descriptors: Telecommunications, Computer Interfaces, Computer Uses in Education, Educational Technology

Combs, Joseph, Jr. – Library Software Review, 1995
Reviews the Total Library Computerization program, which can be used to manage small to midsized libraries. Discusses costs; operating system requirements; security features; user-interface styles; and system modules including online cataloging, circulation, serials control, acquisitions, authorities control, and interlibrary loan. (Author/JMV)
Descriptors: Authority Control (Information), Cataloging, Computer Interfaces, Computer Security