Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 6 |
| Since 2017 (last 10 years) | 15 |
| Since 2007 (last 20 years) | 65 |
Descriptor
Source
Author
| Goldsborough, Reid | 4 |
| Descy, Don E. | 2 |
| Dixit, R. K. | 2 |
| Johnson, Doug | 2 |
| Panettieri, Joseph C. | 2 |
| Smith, Carol L., Ed. | 2 |
| Smith, Peter, Ed. | 2 |
| Adamo, Oluwayomi | 1 |
| Akins, M. L. | 1 |
| Alexander, Rodney T. | 1 |
| Anna Drobná | 1 |
| More ▼ | |
Publication Type
Education Level
Location
| United Kingdom | 4 |
| California | 3 |
| Italy | 3 |
| Ohio | 3 |
| United States | 3 |
| Brazil | 2 |
| Canada | 2 |
| Estonia | 2 |
| Florida | 2 |
| France | 2 |
| Georgia | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Family Educational Rights and… | 3 |
| Individuals with Disabilities… | 2 |
| Health Insurance Portability… | 1 |
| Social Security | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Goldsborough, Reid – Education Digest: Essential Readings Condensed for Quick Review, 2009
It has been said that a computer lets a person make more mistakes faster than any other invention in human history, with the possible exceptions of handguns and tequila. Computers also make mistakes on their own, whether they're glitches, conflicts, bugs, crashes, or failures. Avoiding glitches is considerably less frustrating than trying to fix…
Descriptors: Maintenance, Computers, Computer Software, Computer Security
Shaw, Bilal A. – ProQuest LLC, 2010
Quantum error-correcting codes have been the cornerstone of research in quantum information science (QIS) for more than a decade. Without their conception, quantum computers would be a footnote in the history of science. When researchers embraced the idea that we live in a world where the effects of a noisy environment cannot completely be…
Descriptors: Information Science, Programming, Information Theory, Computer Science
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Demski, Jennifer – Campus Technology, 2011
The burgeoning consumer-tech market is creating new challenges for higher education IT departments. As increased expectations of mobility and connectivity have students and faculty looking to consumer technology to meet their academic needs, IT must revamp operations and infrastructure to meet the demand, while keeping security risks and budgets…
Descriptors: Information Services, Educational Technology, Technology Integration, Higher Education
Association Supporting Computer Users in Education, 2018
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. Begun in 1968 as the College and University Eleven-Thirty Users' Group…
Descriptors: Computer Uses in Education, Conferences (Gatherings), College Students, Portfolios (Background Materials)
Jabbour, Ghassan – ProQuest LLC, 2010
The increasing proliferation of globally interconnected complex information systems has elevated the magnitude of attacks and the level of damage that they inflict on such systems. This open environment of intertwined financial, medical, defense, and other systems has attracted hackers to increase their malicious activities to cause harm or to…
Descriptors: Computer Software, Information Systems, Computers, Databases
Willard, Nancy – Corwin, 2012
Concerns about children's online safety have evolved from protecting them to focusing on encouraging positive social norms, transmitting effective skills, and encouraging students to be helpful allies. In fact, federal law now requires schools that receive funding to educate students about cyber safety. Nancy Willard integrates her expertise in…
Descriptors: Child Safety, Computers, Internet, Secondary School Students
Cleveland, Lara L. – ProQuest LLC, 2011
This project explores the way information about law is transformed into organizational policies and practices. Existing literature emphasizes the state and organized professional groups as primary interpreters of the law and as creators of legal implementation strategies in the organizational setting. This case study of university responses to…
Descriptors: Laws, College Environment, Work Environment, Computers
Young, Jeffrey R. – Education Digest: Essential Readings Condensed for Quick Review, 2009
In this article, the author presents the top-10 list of campus computer-security risks he compiled based on several recent computing surveys and interviews with more than a dozen college-technology leaders. The list, ordered from least to most serious, is by no means scientific, but it gives a sense of where today's battle lines are--and why…
Descriptors: Computer Security, Computers, Social Networks, Evaluation Methods
Hodgins, Dave – Journal of Web Librarianship, 2010
The explosion of Web 2.0 into libraries has left many smaller academic libraries (and other libraries with limited computing resources or support) to work in the cloud using free Web applications. The use of commercial Web hosting is an innovative approach to the problem of inadequate local resources. While the idea of insourcing IT will seem…
Descriptors: Computers, Academic Libraries, Internet, Word Processing
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Technology & Learning, 2008
When it comes to IT, there has always been an important link between data center control and client flexibility. As computing power increases, so do the potentially crippling threats to security, productivity and financial stability. This article talks about Dell's On-Demand Desktop Streaming solution which is designed to centralize complete…
Descriptors: Computers, Computer Security, Computer Centers, Data Processing
Miles, Tracy L. – ProQuest LLC, 2009
One of the most significant challenges faced by government officials today is securing information systems to make them more resilient to attack from increasingly complex challenges from cyber-criminals, state-sponsored groups, and other threats. Over the years, the federal government has developed and implemented Certification and Accreditation…
Descriptors: Information Systems, Information Technology, Federal Government, Accreditation (Institutions)
Bosley, Sara – Adults Learning, 2011
Everyone knows that lack of internet access can reinforce the social and economic disadvantages already facing some older people. Recognising the divisive nature of digital exclusion, the government has invested 2.8 million British Pounds in Get Digital, a project that will enable sheltered housing residents to develop computer and internet…
Descriptors: Focus Groups, Computers, Housing, Educational Technology
Foster, Andrea L. – Chronicle of Higher Education, 2008
Patrick A. Grant was stolen in April. A thief walked away with a laptop containing the University of Virginia biochemist's name and Social Security number, as well as those of more than 7,000 other professors, staff members, and students. The machine belonged to a university employee who had taken it off campus--and then it was simply taken. The…
Descriptors: Computer Software, Computers, Computer Security, Crime

Direct link
Peer reviewed
