Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 10 |
Computer Software | 10 |
Costs | 10 |
Information Technology | 4 |
Educational Technology | 3 |
Experiential Learning | 2 |
Internet | 2 |
Models | 2 |
Problem Based Learning | 2 |
Programming | 2 |
Risk Management | 2 |
More ▼ |
Source
ProQuest LLC | 4 |
Computers in Libraries | 1 |
European Journal of… | 1 |
Internet Research | 1 |
Journal of Educational… | 1 |
School Business Affairs | 1 |
Author
Daehn, Ralph M. | 1 |
Gupta, Manish | 1 |
Howe, Grant | 1 |
Lahiri, Atanu | 1 |
Lesisko, Lee James | 1 |
Lin, Binshan | 1 |
Malaika, Majid A. | 1 |
Sextos, Anastasios G. | 1 |
Straub, Jeremy | 1 |
Wen, H. Joseph | 1 |
Yen, David C. | 1 |
More ▼ |
Publication Type
Journal Articles | 5 |
Dissertations/Theses -… | 4 |
Reports - Descriptive | 4 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Greece | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Zhao, Mingyi – ProQuest LLC, 2016
In today's rapidly digitizing society, people place their trust in a wide range of digital services and systems that deliver latest news, process financial transactions, store sensitive information, etc. However, this trust does not have a solid foundation, because software code that supports this digital world has security vulnerabilities. These…
Descriptors: Computer Software, Information Security, Computer Security, Cooperation
Straub, Jeremy – Journal of Educational Technology Systems, 2014
The development of software for spacecraft represents a particular challenge and is, in many ways, a worst case scenario from a design perspective. Spacecraft software must be "bulletproof" and operate for extended periods of time without user intervention. If the software fails, it cannot be manually serviced. Software failure may…
Descriptors: Comparative Analysis, Computer Software, Computer Science Education, Educational Technology
Malaika, Majid A. – ProQuest LLC, 2011
With today's high demand for online applications and services running on the Internet, software has become a vital component in our lives. With every revolutionary technology comes challenges unique to its characteristics; for online applications, security is one huge concern and challenge. Currently, there are several schemes that address…
Descriptors: Internet, Programming, Automation, Methods
Lahiri, Atanu – ProQuest LLC, 2010
This dissertation consists of three essays that examine, in three specific contexts, issues related to pricing of information goods and services. As the ability to measure technology resource usage gets easier with increased connectivity, the question whether a technology resource should be priced by the amount of the resource used or by the…
Descriptors: Costs, Fees, Information Technology, Telecommunications
Gupta, Manish – ProQuest LLC, 2011
Increasing complexity and sophistication of ever evolving information technologies has spurred unique and unprecedented challenges for organizations to protect their information assets. Companies suffer significant financial and reputational damage due to ineffective information technology security management, which has extensively been shown to…
Descriptors: Information Technology, Computer Security, Organizations (Groups), Global Approach
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Lesisko, Lee James – 2003
This study analyzes the controversy of software piracy in education. It begins with a real world scenario that presents the setting and context of the problem. The legalities and background of software piracy are explained and true court cases are briefly examined. Discussion then focuses on explaining why individuals and organizations pirate…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Costs

Wen, H. Joseph; Yen, David C.; Lin, Binshan – Internet Research, 1998
Explains how intranets facilitate documentation availability within a company at substantial cost savings. Topics include intranet document management systems (IDMS); publication costs for printed materials; hardware and software specifications; performance; and security. (Author/LRW)
Descriptors: Computer Security, Computer Selection, Computer Software, Corporations
Daehn, Ralph M. – Computers in Libraries, 2000
Explains the public printing services available at computer terminals for patrons at the University of Guelph (Ontario) libraries. Highlights include configurations of the public workstations; client and server hardware and software; security features; cost projections; and printing charges. (LRW)
Descriptors: Academic Libraries, Computer Printers, Computer Security, Computer Software