Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Access to Information | 11 |
Computer Security | 11 |
Information Dissemination | 11 |
Internet | 5 |
Computer Networks | 4 |
Higher Education | 4 |
Privacy | 4 |
Users (Information) | 4 |
Disabilities | 3 |
Educational Environment | 3 |
Educational Technology | 3 |
More ▼ |
Author
Aburto, Rafael | 1 |
Basken, Paul | 1 |
Briden, Judi | 1 |
Capus, Laurence | 1 |
Ely, Donald P. | 1 |
Isias, Pedro, Ed. | 1 |
Issa, Theodora, Ed. | 1 |
Issa, Tomayess, Ed. | 1 |
Kommers, Piet, Ed. | 1 |
McCollum, Roy | 1 |
McKay, Elspeth, Ed. | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 5 |
Speeches/Meeting Papers | 4 |
Collected Works - Proceedings | 2 |
Guides - Non-Classroom | 2 |
Journal Articles | 2 |
Dissertations/Theses -… | 1 |
Legal/Legislative/Regulatory… | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Policymakers | 1 |
Location
Australia | 2 |
Asia | 1 |
Brazil | 1 |
China | 1 |
Connecticut | 1 |
Costa Rica | 1 |
Croatia | 1 |
Denmark | 1 |
District of Columbia | 1 |
Egypt | 1 |
Estonia | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Aburto, Rafael – ProQuest LLC, 2014
This qualitative study examined efforts by the military organizations and federal agencies to improve information sharing, interoperability, and systems integration in all business practices. More specifically, a survey instrument with six open-ended and eight demographic questions was used to measure the perceived progress, issues, challenges of…
Descriptors: Qualitative Research, Shared Resources and Services, Access to Information, Agency Cooperation
Mohanna, Mahmoud; Capus, Laurence – International Association for Development of the Information Society, 2013
This paper presents a mobile learning application for a learning course at higher education level. Based on the RSS feed technology, the presented mobile application establishes an in-time communication channel between the instructor and his/her students to keep them up-to-date with all course important dates, instructions and information in…
Descriptors: Technology Uses in Education, Educational Technology, Electronic Learning, Telecommunications
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Titus, Aaron – Chronicle of Higher Education, 2008
This article describes five organizational policies and behavior that put personal information in jeopardy. These are: (1) Inadequate security for old data; (2) Shadow systems and unregulated servers; (3) Unsophisticated privacy policies; (4) Improper use of Social Security numbers; and (5) Unsanitized old hard drives. Although the academic…
Descriptors: Privacy, Educational Environment, Internet, Data
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Stubbs, Keith M. – 1996
This document defines the specific standards and general guidelines which the U.S. Department of Education (ED) will use to make information available on the World Wide Web (WWW). The purpose of providing such guidance is to ensure high quality and consistent content, organization, and presentation of information on ED WWW servers, in order to…
Descriptors: Access to Information, Computer Security, Computer System Design, Disabilities
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology
Ely, Donald P. – 1997
The definition, role, and functions of "library" are changing. The National Library of Education (NLE) is in transition from a traditional library to a virtual library encompassing "one stop [any stop] shopping" through conventional and digital means. To adequately plan for the transition, the customer and potential customers…
Descriptors: Access to Computers, Access to Information, Computer Security, Copyrights
Briden, Judi; Reeb, Brenda; Zhang, Allison – 1997
The Electronic Resources Team at the University of Rochester (New York) River Campus Libraries pursued the concept of one-stop shopping as a component of their new integrated library system Voyager, which debuted in January 1997. Faced with a growing variety of electronic resources with no single guide to their existence and access, the Team dealt…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers