Descriptor
Computer Security | 2 |
Higher Education | 2 |
Information Sources | 2 |
Access to Information | 1 |
College Students | 1 |
Computer Selection | 1 |
Computer Software Selection | 1 |
Computer System Design | 1 |
Computer Use | 1 |
Computer Uses in Education | 1 |
Computers | 1 |
More ▼ |
Source
Library Hi Tech | 1 |
Publication Type
Reports - Descriptive | 2 |
Guides - Classroom - Learner | 1 |
Journal Articles | 1 |
Education Level
Audience
Media Staff | 1 |
Practitioners | 1 |
Students | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Kendall, Diane S.; Marsh, Merle – 2002
This booklet presents questions and answers on everything from how to find out what technology students will need for college to ideas for handling technology emergencies when they are there at college. Information and selected resources are provided under the following questions that head each section: "How do I find out what technology I should…
Descriptors: College Students, Computer Security, Computer Selection, Computer Software Selection