Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Access to Information | 45 |
Computer Networks | 45 |
Information Management | 39 |
Higher Education | 17 |
Information Networks | 15 |
Information Technology | 15 |
Information Dissemination | 11 |
Online Systems | 10 |
Computer System Design | 8 |
Information Services | 8 |
Information Systems | 8 |
More ▼ |
Source
Author
McClure, Charles R. | 3 |
Actis, Bev | 1 |
Amin, Rohan Mahesh | 1 |
Anderson, Byron | 1 |
Beer, Robert | 1 |
Bernbom, Gerald | 1 |
Cahill, Adrian J. | 1 |
Caplan, Priscilla | 1 |
Carroll, Bonnie C. | 1 |
Chapman, Noleen | 1 |
Conrad, L. Dean | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 4 |
Elementary Secondary Education | 2 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 6 |
Administrators | 5 |
Location
United Kingdom | 2 |
Alaska | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
More ▼ |
Laws, Policies, & Programs
Freedom of Information Act | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Wiech, Dean – School Business Affairs, 2013
In today's electronic learning environment, access to appropriate systems and data is of the utmost importance to students, faculty, and staff. Without proper access to the school's internal systems, teachers could be prevented from logging on to an online learning system and students might be unable to submit course work to an online…
Descriptors: Access to Information, Information Management, Information Security, Management Information Systems
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Lyons, Patrice A. – Bulletin of the American Society for Information Science, 1998
Discusses the use of computer networking such as the Internet for the creation and dissemination of copyright works. Topics include the need for data structures for organizing and identifying units of digital information; and the copyright status of original works of authorship structured as digital objects. (LRW)
Descriptors: Access to Information, Computer Networks, Copyrights, Information Dissemination
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Helsing, Cheryl; And Others – 1989
Computers have changed the way information resources are handled. Large amounts of information are stored in one central place and can be accessed from remote locations. Users have a personal responsibility for the security of the system and the data stored in it. This document outlines the user's responsibilities and provides security and control…
Descriptors: Access to Information, Computer Networks, Confidentiality, Databases
Conway, James E. – CAUSE/EFFECT, 1995
The Harvard University (Massachusetts) central computing and development offices collaborated to develop a prototype client/server fund-raising system that allows personnel to easily and quickly access and share prospect information. Its successful development is attributed to use of some traditional project management principles and practices.…
Descriptors: Access to Information, College Administration, Computer Networks, Donors

Morgan, Eric Lease – Public-Access Computer Systems Review, 1994
Provides an overview of the Internet's World-Wide Web (Web), a hypertext system. Highlights include the client/server model; Uniform Resource Locator; examples of software; Web servers versus Gopher servers; HyperText Markup Language (HTML); converting files; Common Gateway Interface; organizing Web information; and the role of librarians in…
Descriptors: Access to Information, Computer Networks, Data Conversion, Gateway Systems

Weiskel, Timothy C. – Library Hi Tech, 1991
An online system designed to help global environmental research, the electronic research system called Eco-Link draws data from various electronic sources including online catalogs and databases, CD-ROMs, electronic news sources, and electronic data subscription services to produce briefing booklets on environmental issues. It can be accessed by…
Descriptors: Access to Information, Computer Networks, Databases, Environmental Research
Hill, Julia M. – Electronic Networking: Research, Applications and Policy, 1992
The X.500 Directory Service provides a mechanism for finding information about people, organizations, services, network hardware, and more in the global network environment. Issues involved in X.500 participation by an organization include management support, data gathering, rights and concerns of individuals, access control, privacy, accuracy,…
Descriptors: Access to Information, Computer Networks, Directories, Electronic Mail

Anderson, Byron – Thresholds in Education, 1993
Examines why so many people have trouble understanding and accessing online systems, using the ERIC Silver Platter CD-ROM as an example. All online systems require users to know the proper procedures (protocols) to access information; these differ from product to product and change constantly. Users should know a particular database's scope and…
Descriptors: Access to Information, Computer Networks, Elementary Secondary Education, Ethics
Chapman, Noleen – Information Management & Technology, 1998
Discusses why information technology managers are exploring the economic and strategic advantages of Web technology and finding that legacy systems still have an important role. Presents benefits: centralized management, reduced cost of ownership, wide user access; models of Web-to-host access; the Citrix thin client model; and future of…
Descriptors: Access to Information, Computer Networks, Cost Effectiveness, Information Management
Cornillon, Peter – EDUCAUSE Review, 2005
Higher education institutions will play a central role in all aspects of the development of end-to-end data systems. They will contribute to the evolution of the fundamental data system elements, provide the initial user base that will test these system elements, and they will be among the more important data providers contributing data to the…
Descriptors: Access to Information, Search Engines, Internet, Computer Uses in Education
Cahill, Adrian J.; Sreenan, Cormac J. – Interactive Technology and Smart Education, 2006
This paper examines the design and evaluation of a TV on Demand (TVoD) system, consisting of a globally accessible storage architecture where all TV content broadcast over a period of time is made available for streaming. The proposed architecture consists of idle Internet Service Provider (ISP) servers that can be rented and released dynamically…
Descriptors: Management Systems, Internet, Mathematics, Television

Caplan, Priscilla – Public-Access Computer Systems Review, 1995
Discusses the 1995 OCLC/NCSA Metadata Workshop that met to define a standard set of data elements for describing network-accessible information resources. These document data elements had to be simple enough for authors and publishers to use, to facilitate discovery and retrieval, and to be useful as a basis for descriptive cataloging. (JKP)
Descriptors: Access to Information, Cataloging, Computer Networks, Data