NotesFAQContact Us
Collection
Advanced
Search Tips
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 21 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rahman, Monsurur; Karim, Reza; Byramjee, Framarz – Journal of International Education Research, 2015
Many educational institutions in the United States are currently offering programs through distance learning, and that trend is rising. In almost all spheres of education a developing country like Bangladesh needs to make available the expertise of the most qualified faculty to her distant people. But the fundamental question remains as to whether…
Descriptors: Foreign Countries, Distance Education, Developing Nations, Educational Benefits
Peer reviewed Peer reviewed
Direct linkDirect link
Goertler, Senta; Gacs, Adam – Unterrichtspraxis/Teaching German, 2018
As online educational programs and courses increase (Allen & Seaman, [Allen, I. E., 2014]), it is important to understand the benefits and limitations of this delivery format when assessing students and when comparing learning outcomes. This article addresses the following two questions: (1) What are some of the best practices in assessing…
Descriptors: Online Courses, Second Language Instruction, Second Language Learning, German
Peer reviewed Peer reviewed
Direct linkDirect link
Straub, Jeremy – Journal of Educational Technology Systems, 2014
The development of software for spacecraft represents a particular challenge and is, in many ways, a worst case scenario from a design perspective. Spacecraft software must be "bulletproof" and operate for extended periods of time without user intervention. If the software fails, it cannot be manually serviced. Software failure may…
Descriptors: Comparative Analysis, Computer Software, Computer Science Education, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Yoon, Cheolho; Hwang, Jae-Won; Kim, Rosemary – Journal of Information Systems Education, 2012
Due to the ever-increasing use of the Internet, information security has become a critical issue in society. This is especially the case for young adults who have different attitudes towards information security practices. In this research, we examine factors that motivate college students' information security behaviors. Based on the concept of…
Descriptors: Internet, Privacy, Computer Security, Information Security
Peer reviewed Peer reviewed
Direct linkDirect link
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Kovac, Ron J. – School Business Affairs, 1999
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Descriptors: Computer Security, Costs, Elementary Secondary Education, Guidelines
Svetcov, Eric – Technology & Learning, 2005
This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…
Descriptors: Costs, Computer Networks, Computer Security, Educational Technology
Boerner, Gerald L. – Syllabus, 2002
Discusses the use of wireless local area networks (WLANs) on college campuses. Highlights include traditional wired networks; cost, speed, and reliability; wireless networking standards; mobility; installation speed, simplicity, and flexibility; reduced cost of ownership; scalability; security issues; and a glossary of WLAN terms. (LRW)
Descriptors: Computer Security, Costs, Glossaries, Higher Education
Peer reviewed Peer reviewed
Wen, H. Joseph; Yen, David C.; Lin, Binshan – Internet Research, 1998
Explains how intranets facilitate documentation availability within a company at substantial cost savings. Topics include intranet document management systems (IDMS); publication costs for printed materials; hardware and software specifications; performance; and security. (Author/LRW)
Descriptors: Computer Security, Computer Selection, Computer Software, Corporations
Peer reviewed Peer reviewed
Gonzalez, Pedro – Microform and Imaging Review, 1999
Discusses the digital-image storage system at the Archivo General de Indias (Seville) that was developed to conserve original documents and to provide optimal access by researchers. Highlights include image quality, storage medium, computer equipment, remote access, security problems, problems of intellectual property and document ownership,…
Descriptors: Access to Information, Administration, Automation, Computer Security
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Peer reviewed Peer reviewed
McKimmy, Paul B. – International Journal of Instructional Media, 2005
In April 2002, the Technology Advisory Committee of the University of Hawaii-Manoa College of Education (COE) prioritized the upgrade of existing instructional computer labs. Following several weeks of research and discussion, a decision was made to support wireless and mobile technologies during the upgrade. In June 2002, the first of three…
Descriptors: Resource Allocation, Costs, Educational Technology, Telecommunications
Daehn, Ralph M. – Computers in Libraries, 2000
Explains the public printing services available at computer terminals for patrons at the University of Guelph (Ontario) libraries. Highlights include configurations of the public workstations; client and server hardware and software; security features; cost projections; and printing charges. (LRW)
Descriptors: Academic Libraries, Computer Printers, Computer Security, Computer Software
Previous Page | Next Page ยป
Pages: 1  |  2