NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)3
Education Level
Higher Education3
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 50 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Peer reviewed Peer reviewed
Hansen, Craig J. – Bulletin of the Association for Business Communication, 1992
Examines communication technologies in the workplace, provides a brief overview of current research, and offers questions for further exploration. Offers a personal perspective based on the author's experiences as a product manager for NCR Corporation and as a computer industry consultant. Includes discussions on voice mail, fax, hypermedia, and…
Descriptors: Business Communication, Communications, Computer Networks, Electronic Mail
Peer reviewed Peer reviewed
Peha, Jon M. – Educational Leadership, 1995
A Carnegie Mellon University study examined Pittsburgh Public Schools' use of computer networks. Classroom activities included sending work to another party, collaborating on group projects, and exploiting the Internet's remote data sources and processing capabilities. Teachers' computer usage is discussed, along with implementation advice and…
Descriptors: Computer Networks, Educational Benefits, Electronic Mail, Elementary Secondary Education
Peer reviewed Peer reviewed
Waugh, Michael – Journal of Computers in Mathematics and Science Teaching, 1996
Provides details of a study that examined interactions and questioning patterns in the electronic communication exchanges of students (N=21) enrolled in a course designed to provide direction in using an electronic network as an instructional medium. Contains 16 references. (DDR)
Descriptors: Computer Networks, Computer Uses in Education, Constructivism (Learning), Electronic Mail
Zsiray, Stephen W., Jr. – 1993
This paper provides an overview of electronic mail (e-mail) systems and identifies curricular applications of common systems available to educators. Highlights include an outline of selected e-mail services; a description of hardware and software needed to use e-mail; an introduction to the Internet; a look at how e-mail systems help students; and…
Descriptors: Computer Assisted Instruction, Computer Networks, Curriculum Development, Electronic Mail
Tucker, Susan A. – Online, 1987
Provides an overview of new developments in electronic mail, including the interconnection of online networks, some on an international level; and news on system upgrades of specific information services. The growth of the electronic mail industry and possible future trends are discussed and a glossary of technical terms is included. (CLB)
Descriptors: Computer Networks, Electronic Equipment, Electronic Mail, Global Approach
Kennedy, Shirley Duglin – 1998
While the Internet has been called the world's library for its mass of information, its maze makes quick and easy results elusive. This book acts as a guide to quality research and reference sites on the Internet, compiling and profiling more than 500 ready-for-reference sites. The book also examines the best subject directories; offers tips on…
Descriptors: Computer Networks, Computer Software, Electronic Mail, Information Networks
Dessoff, Alan L. – Currents, 1994
Three high-technology approaches are suggested to make college and university development efforts more efficient: (1) use of automated systems for phonathons; (2) use of local area networks to speed access to databases; and (3) exchange of information on electronic bulletin boards. (MSE)
Descriptors: College Administration, Computer Networks, Electronic Mail, Fund Raising
Newby, Gregory B. – 1992
Information technologies such as computer mediated communication (CMC), virtual reality, and telepresence can provide the communication flow required by high-speed management techniques that high-technology industries have adopted in response to changes in the climate of competition. Intra-corporate CMC might be used for a variety of purposes…
Descriptors: Computer Mediated Communication, Computer Networks, Electronic Mail, Futures (of Society)
Lowenthal, Ralph A. – 1989
Bibliographers and librarians are aware of the new information technologies in information storage and retrieval. CD-ROMs and online database systems are two technologies used daily to assist users in accessing needed information. Although these resources are lacking in the fields of journalism and mass communication, possibilities for…
Descriptors: Computer Networks, Databases, Electronic Mail, Information Retrieval
Peer reviewed Peer reviewed
Caverly, David C.; Broderick, Bill – Journal of Developmental Education, 1993
Explains how to access the Internet, discussing hardware and software considerations, connectivity, and types of access available to users. Describes the uses of electronic mail; TELNET, a method for remotely logging onto another computer; and anonymous File Transfer Protocol (FTP), a method for downloading files from a remote computer. (MAB)
Descriptors: Access to Information, Computer Networks, Computer Peripherals, Computer Software
Lomarcan, Diana L. – Computers in Libraries, 1995
Introduces the information superhighway (the Internet), and presents a guide to navigating it. Offers basic instruction on obtaining and learning to use network accounts; locating addresses using Archie and Wide Area Information Server; retrieving information using file transfer protocol; utilizing Gopher to find and retrieve; browsing the World…
Descriptors: Computer Networks, Electronic Mail, Information Networks, Information Retrieval
Negroponte, Nicholas P. – Scientific American, 1991
Creative applications of computer networks are discussed. Products and services of the future that come from imaginative applications of both channel and computing capacity are described. The topics of entertainment, transactions, and electronic personal surrogates are included. (KR)
Descriptors: Computer Networks, Computer Oriented Programs, Computer Peripherals, Computer Science
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4