Publication Date
In 2025 | 1 |
Since 2024 | 16 |
Since 2021 (last 5 years) | 29 |
Since 2016 (last 10 years) | 53 |
Since 2006 (last 20 years) | 161 |
Descriptor
Source
Author
Villano, Matt | 5 |
Hawkins, Brian L. | 3 |
Rudy, Julia A. | 3 |
Dixit, R. K. | 2 |
Durkin, Sarah S. | 2 |
Fees, Rachel E. | 2 |
Harry May | 2 |
Littman, Marlyn Kemper | 2 |
McCollum, Kelly | 2 |
Moran, Angela L. | 2 |
Murray, Mark M. | 2 |
More ▼ |
Publication Type
Education Level
Location
Ohio | 6 |
California | 5 |
Pennsylvania | 5 |
Texas | 5 |
Florida | 4 |
United States | 4 |
Maryland | 3 |
Massachusetts | 3 |
North Carolina | 3 |
Australia | 2 |
China | 2 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Digital Millennium Copyright… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Connolly, Mary V. – 1997
The Internet is a network of networks, sharing the same protocol and linking universities, research communities, businesses, and individuals world wide. In this new global information infrastructure, all citizens need to understand the power and pitfalls of the technology in order to function as responsible members. This paper discusses issues…
Descriptors: Access to Information, Computer Networks, Computer Security, Copyrights
Institute for Information Studies, Queenstown, MD. – 1999
This collection of commissioned papers provides a variety of perspectives on the impact of global information networks. The following articles are included: "The Promise of Global Networks: An Introduction" (Jorge Reina Schement); "Architecture and Expectations: Networks of the World--Unite!" (Marjory S. Blumenthal); "The…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Security
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Carter, Kim – Technology & Learning, 2001
Describes benefits of programs where schools provide laptop computers for each student. Topics include results of studies that show positive learning outcomes; funding options; implementation; protecting the equipment; resources for learning about laptop programs; staff training and support; and future possibilities, including the implications of…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer Security, Educational Finance
Bernbom, Gerald; And Others – CAUSE/EFFECT, 1994
Faced with the challenge of providing security across a complex, multiprotocol institutional information network, computing services at Indiana University implemented a responsive, collaborative security architecture designed for the future. Information systems design, security principles and strategy, and implementation are described. (Author/MSE)
Descriptors: Access to Information, College Administration, Computer Networks, Computer Oriented Programs
Littman, Marlyn K. – HyperNexus, 1997
The pervasive use of communication technology in schools and universities requires increased security to safeguard information confidentiality, integrity, availability, utility, and authenticity. This article, the first of two, examines procedures for implementing security policy, techniques for minimizing vulnerability, and techniques for…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
Carroll, Michael L.; Downs, W. Scott – 1996
Many organizations grapple with a glut of electronic information spawned by stockpiles of incompatible computers. This book offers solutions in information sharing and computer interaction. Rather than being about the Internet per se, it is about approaches that are characteristic of the Internet and the managerial and technical aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography
Hawke, Constance S. – 2001
The purpose of this book is threefold: (1) to inform Internet users of the legal ramifications of their on-line activities; (2) to help administrators handle specific situations or complaints regarding Internet activity; and (3) to provide guidance for the formulation of acceptable computer use policies on campuses. The chapters are: chapter 1,…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Copyrights

Massie, Malcom – Orana, 1996
Scotch College (Adelaide, Australia) has networked 90% of its classrooms. This article describes the campus computer network and its hardware and configuration; World Wide Web problems and solution; a "mini Internet" of curriculum-specific materials gathered from the Web; student and faculty use; student and staff training; security;…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
McCollum, Kelly – Chronicle of Higher Education, 1999
Colleges and universities are finding that ways to misbehave in computer-mediated communication come along faster than institutions can create policies to deal with them. Although most schools have acceptable-use policies, technological advances change the environment quickly and require flexible policies. Most institutions have created a mix of…
Descriptors: Administrative Policy, Computer Mediated Communication, Computer Networks, Computer Security
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy