Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Source
Computers in Libraries | 2 |
Technology & Learning | 2 |
Academic Questions | 1 |
EDUCAUSE Quarterly | 1 |
EDUCAUSE Review | 1 |
Government Information… | 1 |
Journal of Adolescent Research | 1 |
Library Software Review | 1 |
T.H.E. Journal | 1 |
Author
Beckett, George | 1 |
Bolch, Matt | 1 |
Carl, Noah | 1 |
Cervone, Frank | 1 |
Cole, Timothy W. | 1 |
Luker, Mark A. | 1 |
Petersen, Rodney | 1 |
Radack, Shirley M. | 1 |
Svetcov, Eric | 1 |
Tynes, Brendesha M. | 1 |
Walery, Darrell | 1 |
More ▼ |
Publication Type
Opinion Papers | 12 |
Journal Articles | 11 |
Reports - Descriptive | 5 |
Reports - Evaluative | 2 |
Collected Works - Proceedings | 1 |
Non-Print Media | 1 |
Education Level
Higher Education | 2 |
Audience
Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Carl, Noah – Academic Questions, 2021
Any academic from an overrepresented group who advocates more "diversity" is directly contributing to the lack of "diversity" by remaining in his position. Assuming the number of jobs is relatively fixed, such an individual is effectively saying, "I want the percentage of academics who have the same demographic…
Descriptors: Crime Prevention, Terrorism, Motivation, Social Theories
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology

Walery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information
Svetcov, Eric – Technology & Learning, 2005
This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…
Descriptors: Costs, Computer Networks, Computer Security, Educational Technology
Northwest Educational Technology Consortium, Portland, OR. – 1996
This videotape, a two-hour follow-up to the earlier "Get Wired: Designing Your School Network" teleconference, presents issues in implementing and maintaining a network. Program segments on network management, training and professional development, security and access, and growing the network are addressed by a panel of educators from…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design
Cole, Timothy W. – Computers in Libraries, 1995
Describes installation and configuration of Mosaic and a World Wide Web (WWW) site at Grainger Library. Challenges include choosing a WINSOCK; customizing Mosaic for public-access computers; reducing security risks; maximizing Multipurpose Internet Mail Extensions (MIME); designing a home page; producing Hypertext Markup Language (HTML) documents.…
Descriptors: Academic Libraries, Computer Networks, Computer Security, Computer Software Development
Tynes, Brendesha M. – Journal of Adolescent Research, 2007
Many Internet safety and parenting experts suggest that parents prohibit their teens from social networking sites and other online spaces where predators may lurk. But we may do adolescents a disservice when we curtail their participation in these spaces, because the educational and psychosocial benefits of this type of communication can far…
Descriptors: Safety, Internet, Adolescents, Social Networks

Radack, Shirley M. – Government Information Quarterly, 1994
Examines the role of the National Institute of Standards and Technology (NIST) in the development of the National Information Infrastructure (NII). Highlights include the standards process; voluntary standards; Open Systems Interconnection problems; Internet Protocol Suite; consortia; government's role; and network security. (16 references) (LRW)
Descriptors: Computer Networks, Computer Security, Consortia, Federal Government
Luker, Mark A. – EDUCAUSE Review, 2005
Kenneth J. Klingenstein, Chief Technologist at the University of Colorado, Boulder, and Project Director of the Internet2 Middleware Initiative, is the recipient of the 2003 EDUCAUSE Award for Leadership in Information Technologies. Klingenstein has been involved in computing technology for almost three decades. One of a handful of leaders who…
Descriptors: Educational Technology, Information Technology, Distance Education, Higher Education
Petersen, Rodney – EDUCAUSE Quarterly, 2004
The evolution of terms, such as computer security, network security, information security, and information assurance, appears to reflect a changing landscape, largely influenced by rapid developments in technology and the maturity of a relatively young profession and an emerging academic discipline. What lies behind the evolution of these terms?…
Descriptors: Educational Technology, Higher Education, Information Technology, Vocabulary Development

Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software