NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 7 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Katharina C. Cramer; Nicolas V. Rüffin – Minerva: A Review of Science, Learning and Policy, 2025
Political interest in Research Infrastructures on a European scale has been a new phenomenon, marked in the early 2000s with the launch of the Lisbon Strategy and the European Research Area. European Research Infrastructure policy then developed through, first, the strategic incorporation of incumbents through new modes of coordination; second,…
Descriptors: Research, Foreign Countries, Computer Networks, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Lyndsay Grant – Research in Education, 2024
The digitalisation and datafication of education has raised profound questions about the changing role of teachers' educational expertise and agency, as automated processes, data-driven analytics and accountability regimes produce new forms of knowledge and governance. Increasingly, research is paying greater attention to the significant role of…
Descriptors: Data, Computer Networks, Computer Interfaces, Computer System Design
White, Jautau Kelton – ProQuest LLC, 2017
Current cybersecurity measures have become a major concern for commercial organizations in the United States. As the cyber-attack landscape expands and the skills and knowledge of the cyber-attacker become broader, the current measures that are taken and the laws structured around them are making it increasingly difficult for commercial…
Descriptors: Information Security, Computer Security, Computer Networks, Crime
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Wang, Jianjun – Grantee Submission, 2015
Over the past three years, California State University, Bakersfield received NSF funding to support hands-on explorations in "network security" and "cryptography" through Research Experience Vitalizing Science-University Program (REVS-UP). In addition to the summer bridge component, the grant included development of…
Descriptors: Technology, Computer Security, Crime Prevention, Computer Networks
Peer reviewed Peer reviewed
Toms, Elaine G. – Public Libraries, 1994
Examines Free-Net, and discusses its development and usefulness in delivering the information and services typically provided by community information centers. Discussion includes 10 characteristics of Free-Nets; and sidebars include selected examples of Free-Nets, how to try out a Free-Net, and a sample of Cleveland Free-Net=FEs main menu. (24…
Descriptors: Access to Information, Accountability, Community Information Services, Computer Mediated Communication
Lynch, Clifford – CAUSE/EFFECT, 1998
Describes access management problems associated with networked information systems and the two major architectural approaches used to address them, including discussion of related policy issues such as privacy, accountability, and collection of management data. Focus is on the concerns of colleges and universities and on developing practical…
Descriptors: Access to Information, Accountability, Administrative Policy, College Administration