NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)7
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 38 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Kirsch, Jonathan – ProQuest LLC, 2010
Much of our critical infrastructure is controlled by large software systems whose participants are distributed across the Internet. As our dependence on these critical systems continues to grow, it becomes increasingly important that they meet strict availability and performance requirements, even in the face of malicious attacks, including those…
Descriptors: Computer Networks, Computer System Design, Computer Software, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Ovadia, Steven – Behavioral & Social Sciences Librarian, 2010
Cloud computing is increasingly popular in education. Cloud computing is "the delivery of computer services from vast warehouses of shared machines that enables companies and individuals to cut costs by handing over the running of their email, customer databases or accounting software to someone else, and then accessing it over the internet."…
Descriptors: Computer Software, Internet, Computer Software Evaluation, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Vaquero, L. M. – IEEE Transactions on Education, 2011
The cloud has become a widely used term in academia and the industry. Education has not remained unaware of this trend, and several educational solutions based on cloud technologies are already in place, especially for software as a service cloud. However, an evaluation of the educational potential of infrastructure and platform clouds has not…
Descriptors: Foreign Countries, Advanced Courses, Course Objectives, Computers
Panettieri, Joseph C. – Campus Technology, 2008
Colleges and universities worldwide are turning to the hosted Software as a Service (SaaS) model and saying goodbye to issues like patch management and server optimization. Generally, SaaS involves applications (such as customer relationship management (CRM), enterprise resource planning (ERP), and e-mail) offered by a hosting provider. In this…
Descriptors: Internet, Client Server Architecture, Computer Networks, Performance Technology
Notess, Greg R. – Online, 1995
World Wide Web browsers are compared by speed, setup, hypertext transport protocol (HTTP) handling, management of file transfer protocol (FTP), telnet, gopher, and wide area information server (WAIS); bookmark options; and communication functions. Netscape has the most features, the fastest retrieval, sophisticated bookmark capabilities. (JMV)
Descriptors: Comparative Analysis, Computer Interfaces, Computer Networks, Computer Software Evaluation
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Peer reviewed Peer reviewed
Tomlinson, Helen; Henderson, William – British Journal of Educational Technology, 1995
Surveys current work in Computer Supported Collaborative Learning (CSCL) and describes how technology can be extended to exploit communication between computers. Reviews applications that might make use of network support (distributed CSCL) and evaluates a sample prototype distributed CSCL application. Highlights value, viability, and development…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Software Development, Computer Software Evaluation
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Keyvan, Shahla A.; Pickard, Rodney; Song, Xiaolong – Computer Applications in Engineering Education, 1997
Computer-aided instruction incorporating interactive multimedia and network technologies can boost teaching effectiveness and student learning. This article describes the development and implementation of network server-based interactive multimedia courseware for a fundamental course in nuclear engineering. A student survey determined that 80% of…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer Software Development, Computer Software Evaluation
Anandam, Kamala – 1994
In January 1990, project SYNERGY was launched by 19 two-year colleges and 3 four-year colleges coordinated by Miami-Dade Community College, in Florida, with support from IBM and Title III funds. The project was designed to review and compile lists of useful instructional software for basic skill remediation and develop an integrated, adaptive,…
Descriptors: Community Colleges, Computer Managed Instruction, Computer Networks, Computer Software Development
Kesten, Philip R. – 1997
ERes, an electronic reserve system, allows faculty and staff to make documents available on the World Wide Web without requiring any technical skills. The system was developed at Santa Clara University (California). This paper provides an overview of ERes and includes: technical information; the user interface for entering and viewing documents;…
Descriptors: Access to Information, Computer Networks, Computer Software, Computer Software Evaluation
Ezekiel, Aaron B. – 1995
At the University of New Mexico, stakeholders from the Computer and Information Resources and Technology (CIRT) department, Financial Systems, the Health Sciences Center, and the General Libraries, were involved in deciding on the goals of a project to replace Telnet with a suite of network middleware and productivity software on campus computer…
Descriptors: Automation, Computer Centers, Computer Interfaces, Computer Networks
New York State Education Dept., Albany. – 1991
This manual is intended to provide directors of funded programs and teachers with an awareness of a wide range of technology services, programs, and applications for improving the quality and effectiveness of instructional support services in New York State schools. The first of nine chapters contains two papers: "Technology Support for…
Descriptors: Computer Networks, Computer Software Evaluation, Computer Software Selection, Educational Improvement
Peer reviewed Peer reviewed
Foster, Stuart J.; Hoge, John – Social Studies and the Young Learner, 1997
Reviews a list of seven Web sites that provide extensive information on software available from educational agencies or companies specializing in media products. Recommends 15 social studies software programs covering a variety of topics including the Mayan civilization, Abraham Lincoln, and the Vietnam War. (MJP)
Descriptors: Annotated Bibliographies, Computer Networks, Computer Software Evaluation, Computer Software Selection
Previous Page | Next Page ยป
Pages: 1  |  2  |  3