Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Source
Computers in Libraries | 1 |
ED, Education at a Distance | 1 |
Library Software Review | 1 |
Online Libraries and… | 1 |
Online Submission | 1 |
Author
Beckett, George | 1 |
Cervone, Frank | 1 |
Cradler, John | 1 |
Machovec, George S., Ed. | 1 |
Olagunju, Amos O. | 1 |
Wright, Peter W. | 1 |
Yrchik, John | 1 |
Zirkle, Chris | 1 |
Publication Type
Opinion Papers | 9 |
Journal Articles | 4 |
Reports - Descriptive | 4 |
Speeches/Meeting Papers | 4 |
Reports - Evaluative | 2 |
Collected Works - Proceedings | 1 |
Non-Print Media | 1 |
Education Level
Audience
Location
Canada | 1 |
Europe | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information
Olagunju, Amos O. – Online Submission, 2008
Incorrect access to Web site addresses and spam e-mails are continuing to make pornography rampant on the Internet at schools, homes and libraries. Collectively, parents, teachers and members of communities must become more aware of the risks and consequences of open access to the Internet, and the distinction between censorship and Internet…
Descriptors: Safety, Parent Participation, Parent Role, Parent School Relationship
Telecommunications Policy Research Conference. Computer and Communications Security Section. Papers.
Telecommunications Policy Research Conference, Inc., Washington, DC. – 1987
In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…
Descriptors: Access to Information, Banking, Computer Security, Cryptography

Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software
Machovec, George S., Ed. – Online Libraries and Microcomputers, 1996
Examines issues surrounding the publication of electronic journals and describes publisher solutions to these issues. Topics include pricing, security, electronic page layout, copyright, backfile availability, and reliability and accessibility of data. Describes some electronic journal projects and lists electronic journal services available via…
Descriptors: Access to Information, Computer Security, Copyrights, Costs
Yrchik, John; Cradler, John – ED, Education at a Distance, 1994
Discusses guidelines that were developed to ensure that the National Information Infrastructure provides expanded opportunities for education and training. Topics include access requirements for homes and work places as well as schools; education and training application requirements, including coordination by federal departments and agencies; and…
Descriptors: Access to Computers, Access to Information, Computer Assisted Instruction, Computer Security
Northwest Educational Technology Consortium, Portland, OR. – 1996
This videotape, a two-hour follow-up to the earlier "Get Wired: Designing Your School Network" teleconference, presents issues in implementing and maintaining a network. Program segments on network management, training and professional development, security and access, and growing the network are addressed by a panel of educators from…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design
Zirkle, Chris – 2001
The Internet offers trade and industrial (T&I) educators a wealth of readily available information for use as teaching aids, supplemental materials, and laboratory resources. These materials provide many distinct benefits; however, there are also several issues that must be addressed when using the Internet as an adjunct in teaching. These…
Descriptors: Access to Computers, Access to Information, Computer Security, Computer Uses in Education
Wright, Peter W. – 2000
Based on the author's presentation at the International Conference on Computer Based Learning in Science, this paper discuses some high profile areas of interest and concern in the educational use of information and communication technology (ICT). The paper is influenced partly by a series of nine government funded "Best Practices"…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Distance Education