Publication Date
In 2025 | 1 |
Since 2024 | 16 |
Since 2021 (last 5 years) | 29 |
Since 2016 (last 10 years) | 53 |
Since 2006 (last 20 years) | 161 |
Descriptor
Source
Author
Villano, Matt | 5 |
Hawkins, Brian L. | 3 |
Rudy, Julia A. | 3 |
Dixit, R. K. | 2 |
Durkin, Sarah S. | 2 |
Fees, Rachel E. | 2 |
Harry May | 2 |
Littman, Marlyn Kemper | 2 |
McCollum, Kelly | 2 |
Moran, Angela L. | 2 |
Murray, Mark M. | 2 |
More ▼ |
Publication Type
Education Level
Location
Ohio | 6 |
California | 5 |
Pennsylvania | 5 |
Texas | 5 |
Florida | 4 |
United States | 4 |
Maryland | 3 |
Massachusetts | 3 |
North Carolina | 3 |
Australia | 2 |
China | 2 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Digital Millennium Copyright… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
Cole, David R. – E-Learning, 2007
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process…
Descriptors: Electronic Learning, Terrorism, Internet, Educational Technology
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security
Enyeart, Mike; Staman, E. Michael; Valdes, Jose J., Jr. – EDUCAUSE Review, 2007
The concept of convergence has evolved significantly during recent years. Today, "convergence" refers to the integration of the communications and computing resources and services that seamlessly traverse multiple infrastructures and deliver content to multiple platforms or appliances. Convergence is real. Those in higher education, and especially…
Descriptors: Educational Opportunities, Higher Education, Educational Trends, Surveys
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security

Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design

Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Radack, Shirley M. – Government Information Quarterly, 1994
Examines the role of the National Institute of Standards and Technology (NIST) in the development of the National Information Infrastructure (NII). Highlights include the standards process; voluntary standards; Open Systems Interconnection problems; Internet Protocol Suite; consortia; government's role; and network security. (16 references) (LRW)
Descriptors: Computer Networks, Computer Security, Consortia, Federal Government
McCollum, Kelly – Chronicle of Higher Education, 2000
Describes university courses and programs in protecting computer networks and World Wide Web sites from vandals, cyberterrorists, and malicious hackers. Notes such courses are provided by East Stroudsburg University (Pennsylvania), Purdue University (Indiana), George Mason University (Virginia), and Texas A&M University. Also notes the federal…
Descriptors: College Curriculum, Computer Networks, Computer Security, Government School Relationship
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Hsin, Wen-Jung – InSight: A Collection of Faculty Scholarship, 2007
This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners' daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct,…
Descriptors: Student Motivation, Internet, Computer Networks, Computer Science Education
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy