NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Trust, Torrey – Journal of Digital Learning in Teacher Education, 2012
In the information age, students must learn to navigate and evaluate an expanding network of information. Highly effective teachers model this process of information analysis and knowledge acquisition by continually learning through collaboration, professional development, and studying pedagogical techniques and best practices. Many teachers have…
Descriptors: Web Sites, Web 2.0 Technologies, Computer Software Evaluation, Teacher Collaboration
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
Peer reviewed Peer reviewed
Stanton, Deidre E.; Hooper, Todd – Public-Access Computer Systems Review, 1992
Describes and evaluates LIBS Internet Access Software (also called Sonoma Software), which offers automatic Telnet connection to remote library catalogs, databases, information services, campuswide information services, and other wide-area information access tools. Instructions for obtaining and installing the software are given, and a comparison…
Descriptors: Access to Information, Computer Software Evaluation, Computer System Design, Gateway Systems
Greenfield, Rich – 1997
The author argues that traditional library cataloging (MARC) and the online public access catalog (OPAC) are in collision with the world of the Internet because items in electronic formats undergo MARC cataloging only on a very selective basis. Also the library profession initially isolated itself from World Wide Web development by predicting no…
Descriptors: Access to Information, Authority Control (Information), Automatic Indexing, Bibliographic Records
Peer reviewed Peer reviewed
Atkinson, Roderick D.; Yokley, John R. – CD-ROM Professional, 1993
Describes the development of the Naval Research Laboratory (NRL) library information network which provides NRL scientists with access to CD-ROM databases, electronic journals, software applications, the Internet, and the library's online catalog. Implementation phases, system research and development, CD-ROM networking feasibility analysis,…
Descriptors: Access to Information, Computer Software Evaluation, Databases, Evaluation Criteria