NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Lehrfeld, Michael R. – Association Supporting Computer Users in Education, 2018
Individuals whom have legitimate access to network resources, trade secrets, or otherwise sensitive data as part of their daily functions are categorized as an Insider Risk. Insider Risk has been pushed into the public eye in recent years with the Edward Snowden leaks of 2013. Snowden had a business need to access the data he retrieved but the…
Descriptors: Computer Security, Information Security, Information Storage, Risk
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Peer reviewed Peer reviewed
Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan – Internet Research, 1999
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Descriptors: Computer Networks, Computer Security, Information Retrieval, Local Area Networks
Kim, Ann – Library Journal, 2006
This article discusses the possible answers to most librarians' questions and how advanced and hi-technology help them in the library world. Many of the answers to librarians' questions regarding digital media depend upon community/patron awareness and library resources. In this article, the author presents some quoted statements from electronic…
Descriptors: Librarians, Library Services, Library Development, Information Retrieval
Peer reviewed Peer reviewed
Mudge, Stephen M. – Innovations in Education and Training International, 1999
Discusses advantages and disadvantages of using the Internet for delivering teaching modules and makes recommendations for successful use of the Internet. Highlights include the availability of information at all times and from remote locations, multimedia capabilities, infrastructure needed, security issues, updating, needed skills, and…
Descriptors: Access to Information, Computer Assisted Instruction, Computer Literacy, Computer Security
Karpisek, Marian; And Others – Media & Methods, 1995
Presents five articles and a company resource directory to help librarians successfully incorporate technology into school libraries. Discusses actual situations, examines student needs, and gives advice to help librarians with library automation systems, videodiscs, library security systems, media retrieval, networking CD-ROMs, and locating…
Descriptors: Computer Networks, Computer Security, Educational Media, Elementary Secondary Education