Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 5 |
Since 2006 (last 20 years) | 14 |
Descriptor
Access to Information | 23 |
Computer Security | 23 |
Information Management | 22 |
Information Technology | 12 |
Computer Networks | 7 |
Higher Education | 7 |
Information Systems | 7 |
Privacy | 7 |
Computer Uses in Education | 6 |
Educational Technology | 6 |
Internet | 6 |
More ▼ |
Source
Author
Alawneh, John | 1 |
Amin, Rohan Mahesh | 1 |
Anderson, Laura Challman | 1 |
Beer, Robert | 1 |
Bernbom, Gerald | 1 |
Brown, Justine | 1 |
Camp, John S. | 1 |
Coogan, John F. | 1 |
DeBlois, Peter B. | 1 |
DeSantis, Nick | 1 |
Gillis, R. Peter | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 9 |
Elementary Secondary Education | 4 |
Postsecondary Education | 4 |
Two Year Colleges | 1 |
Audience
Practitioners | 3 |
Administrators | 1 |
Location
Australia | 2 |
Canada | 2 |
Asia | 1 |
Brazil | 1 |
China | 1 |
Connecticut | 1 |
Costa Rica | 1 |
Croatia | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
More ▼ |
Laws, Policies, & Programs
Family Education Loan Program | 1 |
Family Educational Rights and… | 1 |
No Child Left Behind Act 2001 | 1 |
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Ramu, Gandikota – Education and Information Technologies, 2018
In recent years, the Internet of Things (IoT), cloud computing, and wireless body area networks (WBANs) have converged and become popular due to their potential to improve quality of life. This convergence has greatly promoted the industrialization of e-healthcare. With the flourishing of the e-healthcare industry, full electronic health records…
Descriptors: Internet, Records (Forms), Health Services, Information Management
Coogan, John F. – Journal of Electronic Resources Librarianship, 2019
Resolving user access issues is inherent in managing electronic resources in libraries. The University of Maryland University College (UMUC) Library, situated within a predominantly distance learning-centered institution, has developed a series of web-based technical help pages to facilitate resolution of typical issues reported by its…
Descriptors: Access to Information, Users (Information), Information Management, Technical Support
US Department of Education, 2021
As a precursor to this annual report, in February 2018, the Department issued its "U.S. Department of Education Strategic Plan for Fiscal Years [FY] 2018-22" ("Strategic Plan") (see ED586968). The "Strategic Plan" establishes four broad, overarching goals--one goal each in the areas of K-12 education, postsecondary…
Descriptors: Public Agencies, Federal Government, Strategic Planning, Educational Planning
Miller, Beth – Knowledge Quest, 2016
This article addresses the question of what app or website is appropriate for teachers to use for classroom instruction. While most school districts have safety policies related to the Children's Internet Protection Act (CIPA) and the Children's Online Privacy Protection Act (COPPA) implemented by means of software and district firewalls, this…
Descriptors: Computer Oriented Programs, Web Sites, Computer Uses in Education, Computer Security
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
DeSantis, Nick – Chronicle of Higher Education, 2012
College campuses are hothouses of data, including course schedules, degree requirements, and grades. But much of the information remains spread out across software systems or locked on university servers. Start-up companies want to pry the information loose from campus servers in order to offer personalized services that could transform the…
Descriptors: Higher Education, Campuses, Grades (Scholastic), Scores
Murray, Meg Coffin – Journal of Information Technology Education, 2010
Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected, retained and shared electronically expands, so does the need to understand database security. The Defense Information Systems Agency of the US Department of…
Descriptors: Information Technology, Database Design, Confidentiality, Compliance (Legal)
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2007
The Eighth Annual EDUCAUSE Current Issues Survey asked campus information technology leaders to rate the most critical IT challenges facing them, their campuses, and/or their systems. Four findings associated with all respondents to this year's survey merit special mention. First, for the 2007 survey, the CIC decided to split a key issue choice…
Descriptors: Information Systems, Information Technology, Computer Uses in Education, Computer Security
Brown, Justine – T.H.E. Journal, 2006
Over the past five years, the No Child Left Behind Act, with its mandates for collecting and documenting student achievement statistics, has fueled a surge in the volume of data collected by schools, districts, and state education departments. This information explosion has gone hand in hand with technology's growing affordability and…
Descriptors: Federal Legislation, Teacher Effectiveness, Data Collection, Computer Security
General Accounting Office, Washington, DC. Accounting and Information Management Div. – 1995
This report presents an evaluation of the general controls over the Federal Family Education Loan Program (FFELP) information system maintained and operated by a contractor for the U.S. Department of Education (ED), which administers FFELP. The evaluation found that ED's general controls over the FFELP information system did not adequately protect…
Descriptors: Access to Information, Computer Security, Databases, Federal Programs
Patel, Praj – Information Management & Technology, 1997
Because they bring a large gain in productivity for a small investment in software, training, and overhead, organizations are embracing intranets: private World Wide Web sites that limit access to select groups by placing the Web behind a "firewall" or using the server's ability to provide security. Discusses intranets, document…
Descriptors: Access to Information, Computer Security, Cooperative Programs, Cost Effectiveness
Previous Page | Next Page ยป
Pages: 1 | 2