Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 6 |
Computer Uses in Education | 6 |
Privacy | 6 |
Computer Security | 5 |
Internet | 4 |
Higher Education | 3 |
Access to Information | 2 |
Computers | 2 |
Information Services | 2 |
Information Systems | 2 |
Information Technology | 2 |
More ▼ |
Author
Ekhaml, Leticia | 1 |
Littman, Marlyn Kemper | 1 |
Lobodzinski, Suave, Ed. | 1 |
Panettieri, Joseph C. | 1 |
Tomek, Ivan, Ed. | 1 |
Publication Type
Reports - Descriptive | 5 |
Journal Articles | 3 |
Collected Works - Proceedings | 1 |
Opinion Papers | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Audience
Location
Indiana | 1 |
Massachusetts | 1 |
Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Ekhaml, Leticia – School Library Media Activities Monthly, 2001
Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Electronic Mail
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security
Lobodzinski, Suave, Ed.; Tomek, Ivan, Ed. – 1997
The 1997 WebNet conference addressed research, new developments, and experiences related to the Internet and intranets. The 257 contributions of WebNet 97 contained in this proceedings comprise the full and short papers accepted for presentation at the conference. Included are positions papers by leading experts in the field; descriptions of ideas…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Computer System Design
OECD Publishing (NJ1), 2006
The development of digital content raises new issues as rapid technological developments challenge existing business models and government policies. This OECD study identifies and discusses six groups of business and public policy issues and illustrates these with existing and potential OECD Digital Content Strategies and Policies: (1) Innovation…
Descriptors: Intellectual Property, Job Skills, Job Training, Foreign Countries