NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)8
Publication Type
Reports - Descriptive16
Journal Articles15
Opinion Papers1
Speeches/Meeting Papers1
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 16 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Rednic, Emanuil; Toma, Andrei – Journal of Applied Quantitative Methods, 2009
In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the database itself, in the same way, for all classic and multimedia records. So what is the reason for the creation of a security…
Descriptors: Computer Security, Management Systems, Databases, Multimedia Materials
Peer reviewed Peer reviewed
Direct linkDirect link
Custer, William L. – New Directions for Institutional Research, 2010
Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…
Descriptors: Institutional Research, Databases, School Security, Computer Security
Hyde, Hartley – Australian Mathematics Teacher, 2007
The transfer of data from one part of a computer to another has always been a complex task in which speed is traded against accuracy and the time required for error correction. Much more complex therefore is the transfer of information from one machine to another of a different type. Difficulties arise when machines are updated, when file formats…
Descriptors: Computer Software, Internet, Information Transfer, Information Systems
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
Just as many people log onto a Web mail site (Gmail, Yahoo, MSN, etc.) to read, write and store their email, there are Web sites out there with word processing, database, and a myriad of other software applications that are not downloadable but used on the site through a Web browser. The user does not have to download the applications to a…
Descriptors: Computer Software, Internet, Online Searching, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Katerattanakul, Pairin; Kam, Hwee-Joo; Lee, James J.; Hong, Soongoo – Journal of Information Systems Education, 2009
The MetaFrame system migration project at WorldPharma, while driven by merger and acquisition, had faced complexities caused by both technical challenges and organizational issues in the climate of uncertainties. However, WorldPharma still insisted on instigating this post-merger system migration project. This project served to (1) consolidate the…
Descriptors: Case Method (Teaching Technique), Business Administration Education, Class Activities, Computer Science Education
Panettieri, Joseph C. – Campus Technology, 2007
There's no silver bullet to information security; universities must continue to keep their antivirus, anti-spyware, firewall, and patch management systems in good working order. These days, the largest target for hackers appears to be university databases. Now, universities are searching for new solutions to safeguard those systems. This article…
Descriptors: Databases, Best Practices, Higher Education, Technology Planning
Peer reviewed Peer reviewed
Fields, Cheryl – Change: The Magazine of Higher Learning, 2005
Another topic involving privacy has attracted considerable attention in recent months--the "student unit record" issue. The U.S. Department of Education concluded in March that it would be feasible to help address lawmakers' concerns about accountability in higher education by constructing a database capable of tracking students from institution…
Descriptors: Student Records, Information Management, Higher Education, Federal Government
Peer reviewed Peer reviewed
Cardinali, Richard – Journal of Educational Media and Library Sciences, 1995
Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)
Descriptors: Computer Security, Crime Prevention, Databases, Information Systems
Wiley, Wayne C. – Technology & Learning, 2004
Managing district information, web sites, and data security as well as supplying information on-demand are just a few of the tasks causing educational administrators to seek new solutions these days. The answer is to streamline the business of running schools by putting all information in one place so coordinated data and files can be accessed.…
Descriptors: Information Management, Databases, Database Management Systems, Computer Software
Henderson, Dave – Technology & Learning, 2005
Providing quality technical support in K-12 environments can be challenging. Unlike the business world, there is generally a less-than-ideal ratio of technical staff to computers, numerous software titles from dozens of vendors, and of course--a much smaller budget. The Victor Central School District in Victor, New York, has employed a number of…
Descriptors: Computer Uses in Education, Technical Assistance, Elementary Secondary Education, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses and health office employees are the creators and caretakers of legal documentation. School nurses have an ethical and legal obligation to protect the integrity of electronic student health records. Although there are many threats to data integrity, from inadequate hardware to electrical surges, one of the most pervasive threats to…
Descriptors: School Nurses, Computer Security, School Health Services, Confidential Records
Peer reviewed Peer reviewed
McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Dunn, Deborah – Association of Small Computer Users in Education (ASCUE), 2005
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
Descriptors: Databases, Information Technology, Computer Security, Computer Literacy
Previous Page | Next Page ยป
Pages: 1  |  2