Descriptor
Computer Networks | 47 |
Higher Education | 47 |
Policy Formation | 47 |
Telecommunications | 16 |
Information Networks | 15 |
Information Technology | 14 |
Access to Information | 13 |
College Administration | 12 |
Technological Advancement | 12 |
Academic Libraries | 10 |
Change Strategies | 7 |
More ▼ |
Source
Author
Detweiler, Richard A. | 2 |
Young, Jeffrey R. | 2 |
Young, Peter R. | 2 |
Allen, Nancy, Comp. | 1 |
Atman, Kathryn S. | 1 |
Brown, Lisa | 1 |
Carroll, Bonnie C. | 1 |
Clagett, Craig A. | 1 |
Curry, Diana | 1 |
Demas, Samuel | 1 |
Dunbar, Keith | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sholtys, Phyllis A. – CAUSE/EFFECT, 1988
With the current state of computing and data communication technology, connecting widely dispersed, multivendor computing resources is a complex and expensive undertaking. Network strategies and management issues are discussed. (MLW)
Descriptors: College Administration, Computer Networks, Higher Education, Local Area Networks
Curry, Diana – CAUSE/EFFECT, 1989
Indiana University has over 300 microcomputers connected to the administrative mainframe. The issue of micro/mainframe data transfer is discussed and guidelines for planning this capability are provided. Types of micro/mainframe data transfer products, product choice, and how the product works in the transfer environment are described. (Author/MLW)
Descriptors: Computer Networks, Computer Uses in Education, Data Processing, Higher Education
Ryland, Jane – CAUSE/EFFECT, 1989
An overview of responses from a number of higher education associations (ACE, EDUCOM and NASULGC, and Cornell University) to the controversial issues that have arisen from the 1988 Internet "worm" are presented. Preliminary results from a CAUSE survey of higher education institutions are discussed. (Author/MLW)
Descriptors: Computer Networks, Computer Software, Databases, Ethics
Stoner, Michael – Currents, 1995
Increasing use of computer networks such as the World Wide Web makes it necessary for colleges and universities to formulate policies concerning institution-related postings. This involves designing institutional pages that are well-formulated, accurate, and in compliance with state and federal laws, and establishing policy that allows for some…
Descriptors: Administrative Policy, Compliance (Legal), Computer Networks, Creativity

Moss, Phil – T.H.E. Journal, 1997
Examines the evolution of the telecommunications systems in Oklahoma higher education and the state policies that developed at the same time. Topics include early televised instruction for distance education; policy development and evolution; OneNet, the statewide network for education and government; and policy challenges. (Author/LRW)
Descriptors: Computer Networks, Distance Education, Educational Television, Government School Relationship
Brown, Lisa; And Others – 1994
This paper discusses the process for developing a campus-wide computer ethics policy at Illinois Wesleyan University. As a part of a campus-wide computerization planning effort, the university realized it would be necessary to set in place rules of conduct, methods of monitoring conduct, and penalties for transgressions of these policies. The need…
Descriptors: Computer Networks, Computer Uses in Education, Ethics, Futures (of Society)
Sholtys, Phyllis – CAUSE/EFFECT, 1987
"Downsizing" has become the newest catchword as more and more traditional applications are being implemented on microcomputers or in a cooperative processing environment encompassing both micro and mainframe capability. Organizational adaptation to the change occurring in the computer industry is discussed. (MLW)
Descriptors: College Administration, College Planning, Computer Networks, Coordination

Johnson, David R.; And Others – West's Education Law Reporter, 1989
Among the protective measures against computer viruses that universities should consider are the following: (1) establishment of policies regarding student and faculty conduct; (2) distribution of information; (3) limitations on access to college computers; (4) establishment of operational safeguards; and (5) creation of an emergency action plan.…
Descriptors: Computer Networks, Computer Software, Emergency Programs, Higher Education
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Vocino, Michael; And Others – 1990
The final report from the Higher Education Library Integrated Network (HELIN)'s Task Force on Bibliographic and Authority Control begins with a statement of the charge to the task force. It then summarizes its activities in each of five areas: (1) documentation of local authority control (cataloging) practices; (2) consultation with vendors of…
Descriptors: Academic Libraries, Bibliographic Databases, Cataloging, Classification
Savage, James G., Ed.; Wedemeyer, Dan J., Ed. – 1994
This volume comprises the papers presented at the 1994 conference of the Pacific Telecommunications Council. This gathering, which focused on the theme, "Forging New Links: Focus on Developing Economies," brought together more than 1,100 participants from over 40 countries. The 146 papers are organized chronologically, according to date…
Descriptors: Communications Satellites, Computer Networks, Developing Nations, Distance Education
Guernsey, Lisa – Chronicle of Higher Education, 1997
Election of a new executive director for H-Net, a humanities and social sciences mailing-list network, is marked by controversy over the large role of Michigan State University in the network, due to the incumbent's faculty status there, and over the extent of his authority. The conflict has extended to how open the network should be to diverse…
Descriptors: Administrative Policy, Competition, Computer Networks, Elections
Gale, Douglas – Trusteeship, 1998
Discussion of Internet2 and the college or university's decision to participate in the network looks at the characteristics of the system and the advantages of access to it; infrastructure needed to participate; costs to the institution; considerations in making the decision to participate; and the consequences of waiting. (MSE)
Descriptors: Access to Information, College Administration, Computer Networks, Cost Effectiveness
Fishman, Barry J.; Pea, Roy D. – TECHNOS, 1994
Discussion of elementary and secondary school classrooms linking with the Internet focuses on policies needed for successful use of the network. A project conducted at Northwestern University (Illinois) for reconceptualizing high school science education is described, and development of a network use policy is examined. (LRW)
Descriptors: Computer Assisted Instruction, Computer Networks, Curriculum Development, Elementary Secondary Education
Hodges, Marjorie W.; Worona, Steven L. – CAUSE/EFFECT, 1996
Provides guidelines for the development of campus computer policies, focusing on legal issues related to adult material, harassment, privacy, commerce, and copyright. Notes that computer use policies and practices need to evolve in concert with the changing computer culture. (MDM)
Descriptors: Business, College Role, Computer Networks, Computers