NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 465 results Save | Export
Yihe Zhang – ProQuest LLC, 2024
Machine learning (ML) techniques have been successfully applied to a wide array of applications. This dissertation aims to take application data handling into account when developing ML-based solutions for real-world problems through a holistic framework. To demonstrate the generality of our framework, we consider two real-world applications: spam…
Descriptors: Artificial Intelligence, Problem Solving, Social Media, Computer Mediated Communication
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ozan, Ozlem – Turkish Online Journal of Distance Education, 2013
Social networks and mobile technologies are transforming learning ecology. In this changing learning environment, we find a variety of new learner needs. The aim of this study is to investigate how to provide scaffolding to the learners in connectivist mobile learning environment: (1) to learn in a networked environment; (2) to manage their…
Descriptors: Foreign Countries, Social Networks, Distance Education, Educational Environment
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Lomarcan, Diana L. – Computers in Libraries, 1995
Introduces the information superhighway (the Internet), and presents a guide to navigating it. Offers basic instruction on obtaining and learning to use network accounts; locating addresses using Archie and Wide Area Information Server; retrieving information using file transfer protocol; utilizing Gopher to find and retrieve; browsing the World…
Descriptors: Computer Networks, Electronic Mail, Information Networks, Information Retrieval
Peer reviewed Peer reviewed
Teaching Exceptional Children, 1994
Basic information for teachers on using computer networks is offered, including local area networks; national and global networks; electronic mail; finding a connection (local bulletin board systems, college and university computer systems, and state and regional systems); and the Internet. (DB)
Descriptors: Computer Networks, Educational Technology, Electronic Mail, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2009
On Dec. 1, 2006, the once ambiguous role of e-mails in court cases became much more clear. On that day, the Federal Rules of Civil Procedure (FRCP), which govern federal civil litigation, were amended to establish standards for the discovery of electronically stored information, now known as e-discovery. Many corporations began moving quickly to…
Descriptors: Emergency Programs, Labor Standards, School Districts, Court Litigation
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Pettibone, Timothy J.; Roddy, Mary E. – 1987
An inter-university network of computer centers, the "Because It's Time NETwork" (BITNET), is described. Specific guidelines and format requirements for using BITNET, with sample commands, are presented. More than 1,800 computers at over 600 institutions of higher education and research centers in Europe, Asia, and North America are…
Descriptors: Computer Networks, Databases, Electronic Mail, Higher Education
Brandt, D. Scott – Computers in Libraries, 1997
Illustrates how users can take full advantage of the Internet to communicate and to network. Discusses electronic mailing, listservs and Usenet groups; referring cold connections to a Web page; and designing Web pages for maximum information retrieval by search engines. (AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Electronic Mail, Information Networks
Peer reviewed Peer reviewed
Rivera, Julio C.; And Others – T.H.E. Journal, 1994
Examines the use of a local area network in an educational environment to maximize the use of academic computing resources. Topics discussed include information resources, including the Internet; interpersonal communication through electronic mail; group support systems; computer resource management, including software licensing; problems; and…
Descriptors: Computer Assisted Instruction, Computer Networks, Courseware, Electronic Mail
Moore, Jack – Exceptional Parent, 1988
The article describes the IBM/Special Needs Exchange which consists of: (1) electronic mail, conferencing, and a library of text and program files on the CompuServe Information Service; and (2) a dial-in database of special education software for IBM and compatible computers. (DB)
Descriptors: Computer Networks, Computer Software, Disabilities, Electronic Mail
Peek, Robin – Proceedings of the ASIS Mid-Year Meeting, 1992
This extended abstract summarizes the findings of a study that examined nine scholar-focused public electronic discussion groups (EDGs) on BITNET. The roles, rules, and responsibilities of EDG owners are discussed, and several suggestions for enhancing the relationship between the EDG owner and membership are offered. (MES)
Descriptors: Computer Networks, Electronic Mail, Ethics, Information Networks
Martin, Thomas H. – Proceedings of the ASIS Mid-Year Meeting, 1992
Focusing on economic issues related to the NREN (National Research and Education Network), this paper examines the implications for the academic community of a shift to fee-based network services. Costs currently borne by institutions and the feasibility of charging end users are considered. Commercial use of the NREN is also addressed. (two…
Descriptors: Business, Computer Networks, Costs, Electronic Mail
Warshawsky, Gale Solotar – Proceedings of the ASIS Mid-Year Meeting, 1992
Examines commercial communications products that offer electronic mail and special interest forums to determine which would best meet the needs of members of Puppeteers of America and UNIMA (Union International de la Marionette). Services and costs of CompuServe, the WELL (Whole Earth Electronic Link), GEnnie, and Prodigy are described. (MES)
Descriptors: Comparative Analysis, Computer Networks, Costs, Electronic Mail
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  31