Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 11 |
Descriptor
Computer Software | 15 |
Internet | 15 |
Higher Education | 7 |
Access to Information | 5 |
Computer Security | 5 |
Educational Technology | 5 |
Ethics | 5 |
Foreign Countries | 4 |
Information Technology | 4 |
Web Sites | 4 |
Cheating | 3 |
More ▼ |
Source
Chronicle of Higher Education | 15 |
Author
Foster, Andrea L. | 3 |
Cesarini, Paul | 1 |
Guterman, Lila | 1 |
Kean, Sam | 1 |
Lipka, Sara | 1 |
Maloney, Edward J. | 1 |
Olson, Gary A. | 1 |
Parry, Marc | 1 |
Selingo, Jeffrey | 1 |
Wasley, Paula | 1 |
Wilson, David L. | 1 |
More ▼ |
Publication Type
Journal Articles | 15 |
Reports - Descriptive | 14 |
Collected Works - Serial | 1 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 3 |
Audience
Administrators | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Social Security | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Parry, Marc – Chronicle of Higher Education, 2012
Data mining hinges on one reality about life on the Web: What you do there leaves behind a trail of digital bread crumbs. Companies scoop them up to tailor services, like the matchmaking of eHarmony or the book recommendations of Amazon. Now colleges, eager to get students out the door more efficiently, are awakening to the opportunities of…
Descriptors: Academic Records, Internet, Academic Degrees, Higher Education
Lipka, Sara – Chronicle of Higher Education, 2009
Students have cheated for centuries, but the problem is knottier than it used to be. The Internet and its infinite dishonest shortcuts have made many cases more complex, and antiplagiarism software like Turnitin flags more potential offenses than could be caught before. At the same time, professors' and college presidents' run-ins with plagiarism…
Descriptors: Cheating, Integrity, Ethics, College Presidents
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime
Wasley, Paula – Chronicle of Higher Education, 2008
Among the 100-odd colleges with academic honor codes, plagiarism-detection services raise a knotty problem: Is software compatible with a system based on trust? The answer frequently devolves to the size and culture of the university. Colleges with traditional student-run honor codes tend to "forefront" trust, emphasizing it above all else. This…
Descriptors: Plagiarism, Trust (Psychology), Cheating, Computer Software
Guterman, Lila – Chronicle of Higher Education, 2008
Blogs, wikis, and social-networking sites such as Facebook may get media buzz these days, but for scientists, engineers, and doctors, they are not even on the radar. The most effective tools of the Internet for such people tend to be efforts more narrowly aimed at their needs, such as software that helps geneticists replicate one another's…
Descriptors: Web Sites, Research Reports, Research Tools, Engineering
Foster, Andrea L. – Chronicle of Higher Education, 2007
Immersive Education is a multimillion-dollar project devoted to build virtual-reality software exclusively for education within commercial and nonprofit fantasy spaces like Second Life. The project combines interactive three-dimensional graphics, Web cameras, Internet-based telephony, and other digital media. Some critics have complained that…
Descriptors: Video Games, Fantasy, Computer Software, Foreign Countries
Kean, Sam – Chronicle of Higher Education, 2007
In this article, the author discusses a computer program called Psiphon which bypasses government filters undetected. The University of Toronto's Citizen Lab, a research center for digital media and politics, designed Psiphon for technology-savvy activists. Some technology-savvy activists use other open-source software, like Tor (which relies on…
Descriptors: Foreign Countries, Information Technology, Computer Software, Social Networks
Foster, Andrea L. – Chronicle of Higher Education, 2007
Learning is valuable, but in Africa it is more than that: It is prohibitively expensive. In Ethiopia, where the per-capita income is about $100 a year, a single textbook at Addis Ababa University can cost $50. In order to get more textbooks to students in developing nations, two people are leading an ambitious project to produce and freely…
Descriptors: Textbooks, Information Systems, Information Technology, Foreign Countries
Young, Jeffrey R. – Chronicle of Higher Education, 2001
Describes how colleges, frustrated by students who use the Internet to plagiarize, are going online to enable professors to fight back. Explains that plagiarism-detection software, available for several years, is increasing in use. (EV)
Descriptors: Cheating, College Students, Computer Software, Higher Education
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Olson, Gary A. – Chronicle of Higher Education, 2007
Many professors, staff members, and even administrators see campus computers and e-mail accounts as their own private property--a type of employment benefit provided with no constraints on use. The fact is, universities "assign" computer equipment to personnel as tools to help them perform their jobs more effectively and efficiently, in the same…
Descriptors: Ethics, College Faculty, Computer Security, Electronic Mail
Maloney, Edward J. – Chronicle of Higher Education, 2007
The past 15 years have seen a significant increase in the use of technology in higher education. In fact, professors now find it difficult to imagine teaching without the Internet, course-management systems, Microsoft Office, e-mail, and other technological applications. Course-management systems allow faculty members to deliver materials to their…
Descriptors: Internet, Higher Education, Technology Integration, Computer Uses in Education
Wilson, David L. – Chronicle of Higher Education, 1995
College faculty and students wishing to establish Internet connections are offered basic information on software selection for making direct connections, browsing the information services, and making indirect connections through on-line services. (MSE)
Descriptors: Access to Information, Computer Software, Computer Software Selection, Computers
Selingo, Jeffrey – Chronicle of Higher Education, 1998
In the process of trying to preserve Internet history by archiving it, a company has developed a powerful Internet search engine that provides information on Web site usage patterns, which can act as a relatively objective source of information about information sources and can link sources that a researcher might otherwise miss. However, issues…
Descriptors: Archives, Computer Software, Higher Education, Information Technology
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This January 30, 2004 issue of "Chronicle for Higher Education" includes the following articles: (1) "Fighting to Get out of a Rio Slum" (Lloyd, Marion); (2) "Against…
Descriptors: Slums, Adolescents, Foreign Countries, Student Organizations