Descriptor
Computer Security | 28 |
World Wide Web | 28 |
Access to Information | 9 |
Higher Education | 9 |
Internet | 9 |
Information Technology | 8 |
Privacy | 6 |
Computer Networks | 4 |
Computer Uses in Education | 4 |
Crime | 4 |
Foreign Countries | 4 |
More ▼ |
Source
Author
Aggelis, George | 1 |
Aldridge, Alicia | 1 |
Bleimann, Udo | 1 |
Briden, Judi | 1 |
Chen, Linlin Irene | 1 |
Cole, Timothy W. | 1 |
Colman, Sue | 1 |
Fabregat-Gesa, R. | 1 |
Forcht, Karen | 1 |
Fraser, Bruce T. | 1 |
Freedman, Maurice J. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 28 |
Journal Articles | 22 |
Speeches/Meeting Papers | 4 |
Collected Works - Proceedings | 1 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Education Level
Audience
Practitioners | 5 |
Media Staff | 3 |
Administrators | 2 |
Location
Australia | 1 |
Canada | 1 |
New York | 1 |
Spain | 1 |
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Vandegrift, Kay E. – School Library Journal, 1996
Describes procedures for librarians interested in building a World Wide Web site. Highlights include hypertext markup language; home pages; determining audiences and purposes; promoting safety; the planning process, including text length and density, links to external sites, and maintenance; and copyright concerns. (LRW)
Descriptors: Audiences, Computer Security, Copyrights, Planning

Aldridge, Alicia; White, Michele; Forcht, Karen – Internet Research, 1997
Lack of security is perceived as a major roadblock to doing business online. This article examines system, user, and commercial transaction privacy on the World Wide Web and discusses methods of protection: operating systems security, file and data protection, user education, access restrictions, data authentication, perimeter and transaction…
Descriptors: Access to Information, Business, Computer Security, Government Role

Loew, Robert; Stengel, Ingo; Bleimann, Udo; McDonald, Aidan – Internet Research, 1999
Presents an overview of two projects that concern local area networks and the common point between networks as they relate to network security. Discusses security architectures based on firewall components, packet filters, application gateways, security-management components, an intranet solution, user registration by Web form, and requests for…
Descriptors: Computer Networks, Computer Security, Information Retrieval, Local Area Networks

Rowley, Jennifer – Internet Research, 1996
Internet advertising and commercial activity are increasing. This article examines challenges facing the retail industry on the Internet: location; comparison shopping; security, especially financial transactions; customer base and profile; nature of the shopping experience; and legal and marketplace controls. (PEN)
Descriptors: Advertising, Business, Computer Security, Free Enterprise System

Nackerud, Shane A. – Information Technology and Libraries, 1998
Describes CGI (Common Gateway Interface) scripts that are available on the Web and explains how librarians can use them to make Web pages more interactive. Topics include CGI security; Perl scripts; UNIX; and HTML. (LRW)
Descriptors: Computer Interfaces, Computer Security, Gateway Systems, Library Automation

Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models

Khosrow-Pour, Mehdi; Herman, Nancy – Electronic Library, 2001
Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…
Descriptors: Computer Security, Delphi Technique, Electronic Mail, International Law

School Libraries in Canada, 2000
Presents a teaching unit from the Media Awareness Network Web site that introduces students (grades six through nine) to ways in which commercial Web sites collect personal information from children and issues surrounding children and privacy on the Internet. Highlights: objective; learning outcomes; preparation and materials; the lesson; guided…
Descriptors: Child Safety, Children, Class Activities, Computer Security
McCollum, Kelly – Chronicle of Higher Education, 2000
Describes university courses and programs in protecting computer networks and World Wide Web sites from vandals, cyberterrorists, and malicious hackers. Notes such courses are provided by East Stroudsburg University (Pennsylvania), Purdue University (Indiana), George Mason University (Virginia), and Texas A&M University. Also notes the federal…
Descriptors: College Curriculum, Computer Networks, Computer Security, Government School Relationship
National Forum on Education Statistics (ED/OERI), Washington, DC. – 2003
The purpose of this guidebook is to assist education agencies and organizations--which include state education agencies or state departments of education, school districts, and schools--in the development, maintenance, and standardization of effective Web sites. Also included is a detailed examination of the procedures necessary to provide…
Descriptors: Agencies, Computer Security, Computer Uses in Education, Educational Administration
Wanat, Thomas – Chronicle of Higher Education, 1997
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Descriptors: College Students, Computer Science, Computer Security, Crime

McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases

Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education

Orr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks

Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Previous Page | Next Page ยป
Pages: 1 | 2