NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)5
Laws, Policies, & Programs
Family Educational Rights and…1
Goals 20001
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 80 results Save | Export
Huang, Kuo Hung, Ed. – InTech, 2011
Digital library is commonly seen as a type of information retrieval system which stores and accesses digital content remotely via computer networks. However, the vision of digital libraries is not limited to technology or management, but user experience. This book is an attempt to share the practical experiences of solutions to the operation of…
Descriptors: Computer Networks, Publishing Industry, Electronic Libraries, Educational Resources
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Cornillon, Peter – EDUCAUSE Review, 2005
Higher education institutions will play a central role in all aspects of the development of end-to-end data systems. They will contribute to the evolution of the fundamental data system elements, provide the initial user base that will test these system elements, and they will be among the more important data providers contributing data to the…
Descriptors: Access to Information, Search Engines, Internet, Computer Uses in Education
Congress of the U.S., Washington, DC. House Committee on Energy and Commerce. – 1995
This hearing was held to explore the use of technology in education, and how the government can better encourage its use across the country. It is hoped that hearings of this nature will draw attention to the nation's deficiencies in telecommunications and technologies in schools, and that the country will be able to fill those gaps in the near…
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Educational Technology
Edutopia, 1994
This document consists of the first four issues of a newsletter entitled "Edutopia." The name Edutopia signifies a version of what a technology-enriched educational system of the future would look like. The newsletter is intended to facilitate the integration of interactive multimedia and telecommunications technologies with teaching and…
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Educational Innovation
Ritland, Marian; Moore, Sue Shelton – 1999
Nearly 90% of all University of Wisconsin-Eau Claire (UWEC) students and staff are regular users of e-mail. The University has taken advantage of this widespread use and replaced many paper distributions--payroll earnings statements, unofficial transcripts, degree audits, adviser grade reports, bills, et cetera--with distribution via e-mail.…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Uses in Education
Galbreath, Jeremy – Educational Technology, 1999
Examines the network computer, originally conceived as an alternative device to personal computers to access the Internet and World Wide Web, from a technology perspective and looks at potential uses in education. Describes network architecture; discusses uses for library research, educational technology laboratories, and distance education.…
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Distance Education
Fishman, Barry J.; D'Amico, Laura M. – 1994
A suite of networked computer tools within a pedagogical framework was designed to enhance earth science education at the high school level. These tools give students access to live satellite images, weather maps, and other scientific data dealing with the weather, and make it easy for students to make their own weather forecasts by creating…
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Courseware
Rowand, Cassandra – 1999
In 1994, the National Center for Education Statistics (NCES) began surveying approximately 1,000 public schools each year about their access to the Internet, access in classrooms, and since 1996, their type of Internet connections. Based on these findings, this "Issue Brief" discusses the progress public schools have made toward meeting…
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Educational Improvement
Trentin, Guglielmo – Educational Technology Review, 1996
Examines the benefits of the Internet in education. Identifies the differences between telematics in education and network-based education. Discusses the value of computer networks in three teaching contexts: (1) for communication and navigation through distributed information; (2) in support of educational activities that can be conducted with or…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Uses in Education
Peer reviewed Peer reviewed
Pierce, Jean; And Others – Educational Researcher, 1994
Introduces the Educational Research List (ERL-L) in the BITNET/Internet network. How to subscribe to ERL-L is explained, and some other lists of interest to educational researchers are described. The future of network technology is projected, including virtual conferences on educational research. (SLD)
Descriptors: Access to Information, Computer Networks, Computer Uses in Education, Educational Research
Littman, Marlyn K. – HyperNexus, 1997
The pervasive use of communication technology in schools and universities requires increased security to safeguard information confidentiality, integrity, availability, utility, and authenticity. This article, the first of two, examines procedures for implementing security policy, techniques for minimizing vulnerability, and techniques for…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Yerkey, A. Neil – Journal of Education for Library and Information Science, 1997
Describes an institute designed to train librarians to use the Buffalo Free-Net, an open-access community computer system. The objectives were to help librarians become comfortable with networked information and to teach them how to exploit the potential of the network to serve the information needs of their communities. (Author/LRW)
Descriptors: Access to Information, Community Information Services, Computer Networks, Computer Uses in Education
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6