NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)1
Since 2006 (last 20 years)16
Laws, Policies, & Programs
Americans with Disabilities…1
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 133 results Save | Export
Vigil-Hayes, Morgan Ashlee – ProQuest LLC, 2017
The Internet as a networked system has been rendered more complex than ever before as human endpoints are grafted into the system via increasingly pervasive and personalized networked devices. According to the United Nations, the Internet is a transnational enabler of a number of human rights, and as such, access to the Internet has been…
Descriptors: Internet, Computer Networks, Social Networks, Access to Information
Nichols, Bob – New England Journal of Higher Education, 2013
Many rural areas of the country lack an on-ramp to the information superhighway for people who are looking for educational and professional advancement, which leaves these rural communities frustrated by a situation that puts their residents at a significant disadvantage. This article describes Quick Start and Advanced Internet Regions (AIR.U) as…
Descriptors: Rural Areas, Rural Schools, Colleges, Access to Computers
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Peer reviewed Peer reviewed
Direct linkDirect link
Platt, Richard G.; Carper, William B.; McCool, Michael – Journal of Information Systems Education, 2010
In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…
Descriptors: Information Technology, Internet, Case Studies, Access to Information
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Direct linkDirect link
Page, G. Andrew; Hill, Melissa – New Directions for Adult and Continuing Education, 2008
Information, communication, and educational technologies hold promise to connect geographically isolated rural communities, offering adults greater access to educational, financial, and numerous other resources. The Internet and computer-based network technologies are often seen as remedies for communities in economic decline, but they also have…
Descriptors: Social Systems, Indigenous Populations, Rural Areas, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Boezerooy, Petra; Cordewener, Bas; Liebrand, Wim – EDUCAUSE Review, 2007
In "Thinking Ahead: A Vision of the Role of ICT in Education and Research in the Future, 2007-2010," the higher education institutions in the Netherlands agreed on future strategy. Under the direction of SURF, the Dutch national organization, a collaborative strategy for the application of information and communications technology (ICT)…
Descriptors: Foreign Countries, National Organizations, Educational Technology, Cooperation
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Peer reviewed Peer reviewed
Mostafa, Javed – Annual Review of Information Science and Technology (ARIST), 1994
Reviews the literature relating to the development and application of modern imaging technology between 1987 and 1993. Highlights include image representation, including image data, compression, and image formats; and image access, including indexing and modeling, user interface design, and distributed access. (143 references) (LRW)
Descriptors: Access to Information, Computer Networks, Indexing, Information Storage
Peer reviewed Peer reviewed
Direct linkDirect link
Katz, Richard N. – EDUCAUSE Review, 2004
Starting in the late 1960s, data networks were created to connect supercomputers and, later, other intelligent devices. A revolution in communications was in the making. By the late 1970s, computing and communications technologies were leading us from a world of local markets trading in capital goods to one of global markets trading in capital…
Descriptors: Communications, Information Technology, Computer Networks, Global Approach
Fisher, Mark A. – Currents, 1995
Several ways in which colleges and universities without direct access to the Internet can make use of its services are offered, including establishing an account with a commercial vendor, using inexpensive local providers, and connecting through nearby campuses. (MSE)
Descriptors: Access to Information, Computer Networks, Costs, Higher Education
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9