Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Access to Information | 188 |
Computer Networks | 188 |
Higher Education | 188 |
Information Networks | 77 |
Academic Libraries | 69 |
Information Technology | 49 |
Telecommunications | 46 |
Online Systems | 34 |
Databases | 32 |
Library Services | 31 |
Futures (of Society) | 28 |
More ▼ |
Source
Author
Byron, Suzanne | 2 |
Cutright, Patricia J. | 2 |
Lynch, Clifford A. | 2 |
Machovec, George S. | 2 |
Sylvia, Margaret | 2 |
Wilson, David L. | 2 |
Abels, Eileen G. | 1 |
Actis, Bev | 1 |
Allen, Nancy, Comp. | 1 |
Anderson, Byron | 1 |
Aust, Ronald | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 6 |
Elementary Secondary Education | 1 |
Postsecondary Education | 1 |
Location
Australia | 4 |
Arizona | 3 |
Canada | 3 |
Colorado | 3 |
Pennsylvania | 3 |
United Kingdom | 3 |
United States | 3 |
Alaska | 2 |
Asia | 2 |
Hawaii | 2 |
Montana | 2 |
More ▼ |
Laws, Policies, & Programs
Americans with Disabilities… | 1 |
Equal Access | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Villano, Matt – Campus Technology, 2010
If a school is seeking to incorporate more collaborative approaches to teaching and learning, the design of the learning environment--whether it's a classroom or a more informal space--can be a critical factor in making this transformative move. Technology, in particular, can play a pivotal role in enabling students to work effectively in teams…
Descriptors: Cooperative Learning, Teacher Collaboration, Educational Facilities Improvement, Educational Facilities Planning
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Boezerooy, Petra; Cordewener, Bas; Liebrand, Wim – EDUCAUSE Review, 2007
In "Thinking Ahead: A Vision of the Role of ICT in Education and Research in the Future, 2007-2010," the higher education institutions in the Netherlands agreed on future strategy. Under the direction of SURF, the Dutch national organization, a collaborative strategy for the application of information and communications technology (ICT)…
Descriptors: Foreign Countries, National Organizations, Educational Technology, Cooperation

Moen, William E. – Journal of Academic Librarianship, 2000
Discussion of interoperability among computer networks focuses on the need for information policy and information standards to ensure information access. Highlights include library standards; challenges of networked environment standards; and interoperability as a technical goal for information access. (Contains 9 references.) (LRW)
Descriptors: Academic Libraries, Access to Information, Computer Networks, Higher Education
Katz, Richard N. – EDUCAUSE Review, 2004
Starting in the late 1960s, data networks were created to connect supercomputers and, later, other intelligent devices. A revolution in communications was in the making. By the late 1970s, computing and communications technologies were leading us from a world of local markets trading in capital goods to one of global markets trading in capital…
Descriptors: Communications, Information Technology, Computer Networks, Global Approach
Machovec, George S. – Online Libraries and Microcomputers, 1997
Discusses computer user authentication and authorization issues when libraries need to let valid users access databases and information services without making the process too difficult for either party. Common solutions are explained, including filtering, passwords, and kerberos (cryptographic authentication scheme for secure use over public…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Databases
Wilson, David L. – Chronicle of Higher Education, 1994
College administrators recently appealed to students and faculty to change their computer passwords after security experts announced that tens of thousands had been stolen by computer hackers. Federal officials are investigating. Such attacks are not uncommon, but the most effective solutions are either inconvenient or cumbersome. (MSE)
Descriptors: Access to Information, College Faculty, College Students, Computer Networks
Fisher, Mark A. – Currents, 1995
Several ways in which colleges and universities without direct access to the Internet can make use of its services are offered, including establishing an account with a commercial vendor, using inexpensive local providers, and connecting through nearby campuses. (MSE)
Descriptors: Access to Information, Computer Networks, Costs, Higher Education
Illinois Libraries, 1994
Describes plans by the Council of Great Lakes Governors, which includes the states of Illinois, Indiana, Minnesota, Pennsylvania, New York, Michigan, Wisconsin, and Ohio, to develop an information highway linking state governments, computer and research networks, telecommunications providers, and universities. Highlights include the Internet,…
Descriptors: Access to Information, Computer Networks, Cooperation, Electronic Mail

Katz, James E.; Graveman, Richard F. – Telematics and Informatics, 1991
Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…
Descriptors: Access to Information, Computer Networks, Higher Education, Privacy
Sylvia, Margaret – Computers in Libraries, 1996
Saint Mary's University Academic Library (Texas) established remote access to its computer network. Discusses access issues including network protocols and support; multitasking; CD-ROMs; printing capabilities; connection methods; and keyboards. Describes choices of operating systems and software: J&L Chatterbox, bulletin board systems, and…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Printers
Riggen, Gary – CAUSE/EFFECT, 1989
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
Descriptors: Access to Information, Computer Networks, Higher Education, Information Networks

Gaunt, Marianne I. – Information Technology and Libraries, 1994
Describes the development and activities of the Center for Electronic Texts in the Humanities, established by Princeton University and Rutgers University to provide a national focus for the development, dissemination, and use of electronic texts in the humanities. Sidebars explain the Text Encoding Initiative and Standard Generalized Markup…
Descriptors: Access to Information, Computer Networks, Electronic Publishing, Higher Education
Machovec, George S. – Online Libraries and Microcomputers, 1993
Describes VERONICA (Very Easy Rodent-Oriented Net-Wide Index to Computerized Archives), an Internet navigation tool developed at the University of Nevada as an index and access tool to gopher servers on the network. Highlights include connecting to VERONICA; availability of VERONICA server software; and difficulties. (Contains three references.)…
Descriptors: Access to Information, Computer Networks, Computer Software, Computer Software Development

Hazari, Sunil – Journal of Computing in Higher Education, 1994
A discussion of tools available for use of the Internet, particularly by college and university educators and students, offers information on use of various services, including electronic mailing list servers, data communications protocols for networking, inter-host connections, file transfer protocol, gopher software, bibliographic searching,…
Descriptors: Access to Information, Computer Networks, Computer Software, Higher Education