NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
Trends in International…1
What Works Clearinghouse Rating
Showing 481 to 495 of 618 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Campus Technology, 2007
This article profiles the winners of this year's competition for outstanding technology innovation on US college and university campuses. The winners are: (1) Rice University, Texas (virtualized networks); (2) Drexel University, Pennsylvania (rich media); (3) Harvard Business School, Massachusetts (network management); (4) Louisiana State…
Descriptors: Educational Innovation, Awards, Emergency Programs, Higher Education
Robinson, LeAnne K.; Brown, Abbie; Green, Tim – Learning & Leading with Technology, 2007
For the last year the authors have been gathering examples of how perceived "threats of security" are hampering the integration of technology in teaching and learning. They hope that educators will examine both the challenges of increased security demands and ways in which security might enhance, rather than detract from, the use of technology for…
Descriptors: Technology Integration, Educational Technology, Computer Security, Computer Uses in Education
Rhode Island State Board of Governors for Higher Education, Providence. – 1999
This monthly report documents the accomplishments of the Year 2000 project in Rhode Island's public higher education. It reviews computer problems related to the Year 2000 date change, noting the basic technical solution necessary to avoid disruption to higher education, and summarizes Executive Order 99-1, issued in January 1999, requiring all…
Descriptors: Compliance (Legal), Computer Security, Computer Uses in Education, Computers
Peer reviewed Peer reviewed
Breeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet
Peer reviewed Peer reviewed
McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Machovec, George S. – Online Libraries and Microcomputers, 1997
Describes thin clients, a networking technology that allows organizations to provide software applications over networked workstations connected to a central server. Topics include corporate settings; major advantages, including cost effectiveness and increased computer security; problems; and possible applications for large public and academic…
Descriptors: Academic Libraries, Computer Security, Computer Software, Corporations
Peer reviewed Peer reviewed
Payne, Shirley – Educause Quarterly, 2003
Discusses how to develop effective security education and awareness programs to help the wide and varied groups of people on campuses understand their role in campus security, examining: target audiences (e.g., students, parents, faculty, researchers, and administrators); effective delivery methods (e.g., online quizzes, handbooks, and videos);…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology
Nyerges, Mike – Computers in Libraries, 1999
Describes one public school library's struggles and solutions to problems associated with managing its new Windows desktop. To implement goals for organizing the desktop, the library selected the FoolProof desktop security system, utilized networks administration to enforce the school's Acceptable Use Policy, and used Windows 95 System Policies.…
Descriptors: Administration, Computer Networks, Computer Security, Computer System Design
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Carlson, Scott; Foster, Andrea L. – Chronicle of Higher Education, 2002
Describes how many college officials are confused by the USA Patriot Act, a new anti-terrorism law that may affect campus networks and library records; they believe its provisions could raise privacy and academic freedom issues. (EV)
Descriptors: Academic Freedom, Compliance (Legal), Computer Security, Confidential Records
Sendze, Monique – Computers in Libraries, 2006
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Descriptors: Workstations, Public Libraries, Library Services, Library Role
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Bedi, Param – Association of Small Computer Users in Education (ASCUE), 2005
This paper discusses how to implement networking solutions in residence halls at Arcadia University in Philadelphia. Sections of the paper include: (1) About Arcadia University; (2) Residence Halls Network; (3) How Campus Manager Helped Arcadia University; (4) What Is Campus Manager; (5) How Campus Manager Works; (6) Campus Manager Remediation…
Descriptors: Computer Networks, Private Colleges, Computer Uses in Education, Information Networks
Nair, Prakash – 2002
This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…
Descriptors: Computer Security, Computer Uses in Education, Costs, Educational Facilities Design
Pages: 1  |  ...  |  29  |  30  |  31  |  32  |  33  |  34  |  35  |  36  |  37  |  ...  |  42