NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 35 results Save | Export
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Henninger, Jessamyn; Aber, Susan Ward – Issues in Science and Technology Librarianship, 2010
Systems Architects and Information Technology administrators working in higher education help faculty, staff, and student computer users. Yet, who helps them? What resources do these professionals value? A case study was conducted using purposeful sampling and data collection through electronic interview to gather the preferred information-seeking…
Descriptors: Information Technology, Administrators, Higher Education, Resources
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Houston, Melissa; Goggins, Patrick – Technology & Learning, 2008
It used to be much easier to get paid by the San Diego Unified School District (SDUSD). A lot easier, that is, if you didn't work there. Saddled with an antiquated computer system and manual, repetitive data entry of time cards, officials at California's second-largest school district discovered the payroll department was mistakenly issuing $1…
Descriptors: Management Systems, Employees, Computers, School Districts
Alley, Lee; Willits, Stephen D. – CAUSE/EFFECT, 1988
Integrated Services Digital Network (ISDN) promises to integrate voice, data, text, and video services within the context of existing telephone networks. It is a set of standards, or engineering design specifications, that will permit anyone to attach any innovative device to it as long as it abides by the network's protocols. (MLW)
Descriptors: Administrators, College Administration, Computer Networks, Data Processing
Spurgin, Judy Barrett – 1985
Since electronic networking via microcomputers is fast becoming one of the most popular communications mediums of this decade, this manual is designed to help educators use personal computers as communication devices. The purpose of the document is to acquaint the reader with: (1) the many available communications options on electronic networks;…
Descriptors: Administrators, Communications, Computer Networks, Databases
Updegrove, Daniel A.; And Others – EDUCOM Review, 1990
Describes what electronic mail is, how it works, and suggests how it can be used by university administrators. National and international academic networks are described, institutional costs of network memberships are discussed, and procedures for connecting to a network and for using a network are explained. (13 references) (LRW)
Descriptors: Administrators, Computer Networks, Computer Software, Costs
Kahle, Brewster; And Others – Electronic Networking: Research, Applications and Policy, 1992
Describes the Wide Area Information Servers (WAIS) system, an integrated information retrieval system for corporate end users. Discussion covers general characteristics of the system, search techniques, protocol development, user interfaces, servers, selective dissemination of information, nontextual data, access to other servers, and description…
Descriptors: Administrators, Computer Networks, Computer System Design, Information Management
Anderson, Judith – 1995
USENET is a system of special interest discussion groups called newsgroups, to which readers can send or post messages which are then distributed to other computers in the network. A common network is the Internet, but other networks may carry USENET as well. There are thousands of newsgroups, with a wide range of conversations on topics such as…
Descriptors: Access to Information, Administrators, Computer Mediated Communication, Computer Networks
Wallace, Teri; Batholomay, Tom; Hong, Saahoon – 2002
This report presents results of a survey of 1,275 Individualized Education Program (IEP) managers in Minnesota concerning IEP team collaboration and communication, technology use, IEP manager tasks, and effects of IEP software, both networked and non-networked versions. Survey data were divided into five comparative groups: no use of software to…
Descriptors: Administrators, Computer Managed Instruction, Computer Networks, Computer Software
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Leslie, A. N. – 1992
This presentation describes a collaborative distance education project between the University of the West Indies (UWI) and the Caribbean Labor Administration Center (CLAC) which resulted in CLAC using the UWI Distance Teaching Enterprise (UWIDITE) network to offer a training course for labor administrators in the Caribbean region. In addition, UWI…
Descriptors: Administrators, Business Administration Education, Computer Networks, Distance Education
Previous Page | Next Page ยป
Pages: 1  |  2  |  3