NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)7
Laws, Policies, & Programs
Family Educational Rights and…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 52 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Mitchell, Erik T. – Journal of Web Librarianship, 2010
One of the first big shifts in how libraries manage resources was the move from print-journal purchasing models to database-subscription and electronic-journal purchasing models. Libraries found that this transition helped them scale their resources and provide better service just by thinking a bit differently about their services. Likewise,…
Descriptors: Libraries, Library Materials, Electronic Publishing, Electronic Libraries
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Harris, Judi – Computing Teacher, 1994
Explains client software tools that simplify two information access procedures on the Internet, i.e., file transfer and file access. The use of "Fetch" to explore and access file transfer protocol archives, and "TurboGopher," to explore and access Gopher servers, are described. (Contains two references.) (LRW)
Descriptors: Access to Information, Computer Networks, Computer Software, File Transfer Protocol
Sturr, Natalie Oakes – Computers in Libraries, 1995
Describes libraries' use of the Internet to provide information on their local collections and explains how to provide searchable indexes through the use of WAIS (Wide Area Information Server) software. Highlights include Waisindex; file formats; Waissearch; and accessing WAIS indexes via a gopher, WAIS, or WWW (World Wide Web) server. (LRW)
Descriptors: Access to Information, Computer Networks, Computer Software, Indexing
Peer reviewed Peer reviewed
Jacobs, Jim – Government Publications Review, 1990
Discusses electronic bulletin boards that have been created by U.S. government agencies and suggests a method to make the information they contain more accessible to libraries and the public. Costs and technological issues are considered, and an appendix describes networks and computer programs that would facilitate access to government…
Descriptors: Access to Information, Computer Networks, Computer Software, Costs
Peer reviewed Peer reviewed
Quinn, Richard A. – Electronic Library, 1994
Discusses networked document imaging systems and describes necessary software features. Highlights include desktop workstations; network architecture; modular application software; images from a variety of formats; merging images with text; editing functions; managing an electronic library; document delivery formats; and printing. (LRW)
Descriptors: Access to Information, Computer Graphics, Computer Networks, Computer Software
Peer reviewed Peer reviewed
Descy, Don E. – TechTrends, 1994
Describes the World-Wide Web (WWW), a network information resource based on hypertext. How to access WWW browsers through remote login (telnet) or though free browser software, such as Mosaic, is provided. Eight information sources that can be accessed through the WWW are listed. The address of a listserv reporting on Internet developments is…
Descriptors: Access to Information, Computer Networks, Computer Software, Hypermedia
Sylvia, Margaret – Computers in Libraries, 1996
Saint Mary's University Academic Library (Texas) established remote access to its computer network. Discusses access issues including network protocols and support; multitasking; CD-ROMs; printing capabilities; connection methods; and keyboards. Describes choices of operating systems and software: J&L Chatterbox, bulletin board systems, and…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Printers
Machovec, George S. – Online Libraries and Microcomputers, 1993
Describes VERONICA (Very Easy Rodent-Oriented Net-Wide Index to Computerized Archives), an Internet navigation tool developed at the University of Nevada as an index and access tool to gopher servers on the network. Highlights include connecting to VERONICA; availability of VERONICA server software; and difficulties. (Contains three references.)…
Descriptors: Access to Information, Computer Networks, Computer Software, Computer Software Development
Peer reviewed Peer reviewed
Hazari, Sunil – Journal of Computing in Higher Education, 1994
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
Descriptors: Access to Information, Computer Networks, Computer Software, Higher Education
Nickerson, Gord – Computers in Libraries, 1992
Continues a description of the Usenet computer network that began in the previous issue. The effective use of Usenet is discussed, including how to screen out unwanted information, the most helpful newsgroups to access, and setting up news reader software. Ideas for library outreach services via Usenet are also suggested. (LRW)
Descriptors: Access to Information, Computer Networks, Computer Software, Electronic Mail
Valauskas, Edward J. – Online, 1995
Describes the experiences of the American Library Association in implementing an Internet gopher to make information more available to members. Topics discussed include an explanation of gopher software; organizational considerations, including organizational values; training to improve staff familiarity with the Internet; preparing documents for…
Descriptors: Access to Information, Computer Networks, Computer Software, Library Associations
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4