Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Networks | 4 |
| Computer Software Evaluation | 4 |
| Electronic Mail | 4 |
| Access to Information | 2 |
| Coding | 2 |
| Computer Mediated… | 2 |
| Computer Security | 2 |
| Information Transfer | 2 |
| Case Studies | 1 |
| Classification | 1 |
| Classroom Communication | 1 |
| More ▼ | |
Author
| Amin, Rohan Mahesh | 1 |
| Corbett, J. | 1 |
| Duffy, C. | 1 |
| McAteer, Erica | 1 |
| McCollum, Roy | 1 |
| Notess, Greg R. | 1 |
| Tolmie, A. | 1 |
Publication Type
| Journal Articles | 2 |
| Book/Product Reviews | 1 |
| Dissertations/Theses -… | 1 |
| Guides - Non-Classroom | 1 |
| Information Analyses | 1 |
| Opinion Papers | 1 |
| Reports - Descriptive | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 1 |
Audience
Location
| United Kingdom (Scotland) | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Notess, Greg R. – Online, 1995
World Wide Web browsers are compared by speed, setup, hypertext transport protocol (HTTP) handling, management of file transfer protocol (FTP), telnet, gopher, and wide area information server (WAIS); bookmark options; and communication functions. Netscape has the most features, the fastest retrieval, sophisticated bookmark capabilities. (JMV)
Descriptors: Comparative Analysis, Computer Interfaces, Computer Networks, Computer Software Evaluation
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Peer reviewedMcAteer, Erica; Tolmie, A.; Duffy, C.; Corbett, J. – Journal of Computer Assisted Learning, 1997
Examines computer-mediated communication (CMC) in higher education, particularly the evaluation of network resources for course-related student communication. Presents case studies of e-mail seminars in Scottish language studies and music, demonstrates the significance of emphasizing process over outcome, and discusses factors affecting CMC usage:…
Descriptors: Case Studies, Classroom Communication, Computer Mediated Communication, Computer Networks

Direct link
