Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 12 |
Computers | 12 |
Electronic Mail | 12 |
Computer Software | 8 |
Internet | 6 |
Educational Technology | 5 |
Computer Uses in Education | 4 |
College Faculty | 3 |
College Students | 3 |
Computer Networks | 3 |
Ethics | 3 |
More ▼ |
Source
Author
Smith, Carol L., Ed. | 2 |
Smith, Peter, Ed. | 2 |
Bosley, Sara | 1 |
Brooks, Rochelle | 1 |
Buck, Stephanie | 1 |
Crispen, Patrick Douglas | 1 |
Falk, Howard | 1 |
Finkel, Ed | 1 |
Johnson, Doug | 1 |
McCollum, Roy | 1 |
Olson, Gary A. | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 7 |
Collected Works - Proceedings | 2 |
Guides - Non-Classroom | 2 |
Books | 1 |
Guides - Classroom - Teacher | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 2 |
Adult Education | 1 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Administrators | 2 |
Practitioners | 1 |
Teachers | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Bosley, Sara – Adults Learning, 2011
Everyone knows that lack of internet access can reinforce the social and economic disadvantages already facing some older people. Recognising the divisive nature of digital exclusion, the government has invested 2.8 million British Pounds in Get Digital, a project that will enable sheltered housing residents to develop computer and internet…
Descriptors: Focus Groups, Computers, Housing, Educational Technology
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Crispen, Patrick Douglas – Library Talk, 2000
Provides rules for protecting computers from viruses, Trojan horses, or worms. Topics include purchasing commercial antivirus programs and keeping them updated; updating virus definitions weekly; precautions before opening attached files; macro virus protection in Microsoft Word; and precautions with executable files. (LRW)
Descriptors: Computer Security, Computers, Electronic Mail
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security

Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Olson, Gary A. – Chronicle of Higher Education, 2007
Many professors, staff members, and even administrators see campus computers and e-mail accounts as their own private property--a type of employment benefit provided with no constraints on use. The fact is, universities "assign" computer equipment to personnel as tools to help them perform their jobs more effectively and efficiently, in the same…
Descriptors: Ethics, College Faculty, Computer Security, Electronic Mail
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2005
This 2005 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Campus Technology: Anticipating the Future." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document include: (1) Developing…
Descriptors: Virtual Classrooms, Programming (Broadcast), Computers, Tests
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2004
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
Descriptors: Small Colleges, Computers, Student Surveys, Interaction