Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 10 |
Computer Selection | 10 |
Computer Software | 3 |
Computer Uses in Education | 3 |
Access to Information | 2 |
Computer Assisted Instruction | 2 |
Computer System Design | 2 |
Costs | 2 |
Educational Technology | 2 |
Higher Education | 2 |
Information Storage | 2 |
More ▼ |
Source
Information Management &… | 1 |
Internet Research | 1 |
Learning & Leading with… | 1 |
Library Software Review | 1 |
Microform and Imaging Review | 1 |
ProQuest LLC | 1 |
Rural Libraries | 1 |
TECHNOS | 1 |
Author
Beckett, George | 1 |
Boyce, Stephen | 1 |
Gonzalez, Pedro | 1 |
Hall, Don | 1 |
Kelly, Pat | 1 |
Kendall, Diane S. | 1 |
Lin, Binshan | 1 |
Marsh, Merle | 1 |
McDowell, Steve | 1 |
Miller, Kevin | 1 |
Race, Phil | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 7 |
Guides - Non-Classroom | 2 |
Opinion Papers | 2 |
Books | 1 |
Dissertations/Theses -… | 1 |
Guides - Classroom - Learner | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Practitioners | 1 |
Students | 1 |
Teachers | 1 |
Location
Spain | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Boyce, Stephen – ProQuest LLC, 2021
The world continues to be plagued by cyber incidents that impact businesses, schools, hospitals, and government institutions. Some organizations have given cybersecurity a line item on the annual budget, while others have created dedicated departments to improve their technical defenses. Executive boards and C-level executives have shifted from an…
Descriptors: Demography, Decision Making, Computer Security, Undergraduate Students
Kendall, Diane S.; Marsh, Merle – 2002
This booklet presents questions and answers on everything from how to find out what technology students will need for college to ideas for handling technology emergencies when they are there at college. Information and selected resources are provided under the following questions that head each section: "How do I find out what technology I should…
Descriptors: College Students, Computer Security, Computer Selection, Computer Software Selection

Wen, H. Joseph; Yen, David C.; Lin, Binshan – Internet Research, 1998
Explains how intranets facilitate documentation availability within a company at substantial cost savings. Topics include intranet document management systems (IDMS); publication costs for printed materials; hardware and software specifications; performance; and security. (Author/LRW)
Descriptors: Computer Security, Computer Selection, Computer Software, Corporations
Hall, Don; Kelly, Pat – Learning & Leading with Technology, 2005
Increasingly, teachers rely on computer software and networks to both enhance curriculum management and provide engaging learning opportunities in instruction. New software is enabling more frequent formative assessments to better focus day-to-day lessons on the unique needs of individual learners. Administrators use increasingly complex data…
Descriptors: Database Management Systems, Computer Software, Academic Standards, Academic Achievement

Gonzalez, Pedro – Microform and Imaging Review, 1999
Discusses the digital-image storage system at the Archivo General de Indias (Seville) that was developed to conserve original documents and to provide optimal access by researchers. Highlights include image quality, storage medium, computer equipment, remote access, security problems, problems of intellectual property and document ownership,…
Descriptors: Access to Information, Administration, Automation, Computer Security

Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software
Swan, James – Rural Libraries, 1996
Presents a four-phase plan for small libraries strategizing for automation: inventory and weeding, data conversion, implementation, and enhancements. Other topics include selecting a system, MARC records, compatibility, ease of use, industry standards, searching capabilities, support services, system security, screen displays, circulation modules,…
Descriptors: Computer Security, Computer Selection, Data Conversion, Library Automation
Vane-Tempest, Stewart – Information Management & Technology, 1995
Presents a guide for selecting an optional disc system. Highlights include storage hierarchy; standards; data life cycles; security; implementing an optical jukebox system; optimizing the system; performance; quality and reliability; software; cost of online versus near-line; and growing opportunities. Sidebars provide additional information on…
Descriptors: Computer Security, Computer Selection, Computer System Design, Data
Miller, Kevin – TECHNOS, 1997
This article, written by a high school student, describes how he helped his school attain access to state-of-the-art technology and to the Internet. Topics include problems, security issues, teacher training, examples of student Internet projects, technical details of the school's computer system, and how the school encouraged this student's…
Descriptors: Computer Assisted Instruction, Computer Security, Computer Selection, Computer System Design
Race, Phil; McDowell, Steve – 1996
This how-to manual is intended to ease the transition to the information technology age even for those teachers who have no previous knowledge or experience with computers. Written in a concise, numbered paragraph format, the text uses simple nontechnical language. The first chapter titled, "Getting Started with Computers," covers choosing and…
Descriptors: Computer Anxiety, Computer Assisted Instruction, Computer Literacy, Computer Peripherals