NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Reg Leichty – State Education Standard, 2024
Elementary and secondary schools increasingly face an onslaught of ransomware and other cyberattacks, which jeopardize sensitive data and the integrity of their digital infrastructure. The consequences of these attacks can be severe and costly, eroding community trust, disrupting learning, and permanently damaging equipment. The alarming scope and…
Descriptors: Elementary Secondary Education, Computer Security, State Boards of Education, Role Theory
Peer reviewed Peer reviewed
Direct linkDirect link
Landwehr, Peter; Spraragen, Marc; Ranganathan, Balki; Carley, Kathleen M.; Zyda, Michael – Simulation & Gaming, 2013
In this article, the authors discuss the development of the "Sudan Game," an interactive model of the country in the time period leading up to the Sudanese referendum on the secession of the South. While many simulations are designed to educate about their subjects, the "Sudan Game" is intended to be a prototype for policy…
Descriptors: Foreign Countries, Computer Games, Public Policy, Policy Formation
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Peer reviewed Peer reviewed
Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Peer reviewed Peer reviewed
Caplan, Priscilla – Public-Access Computer Systems Review, 1995
Discusses the 1995 OCLC/NCSA Metadata Workshop that met to define a standard set of data elements for describing network-accessible information resources. These document data elements had to be simple enough for authors and publishers to use, to facilitate discovery and retrieval, and to be useful as a basis for descriptive cataloging. (JKP)
Descriptors: Access to Information, Cataloging, Computer Networks, Data
Technology & Learning, 2005
In recent years, the widespread availability of networks and the flexibility of Web browsers have shifted the industry from a client-server model to a Web-based one. In the client-server model of computing, clients run applications locally, with the servers managing storage, printing functions, and network traffic. Because every client is…
Descriptors: Computers, Computer System Design, Internet, Computer Uses in Education