Descriptor
Author
Briden, Judi | 1 |
Cashman, Thomas J. | 1 |
Chen, Linlin Irene | 1 |
Cole, Timothy W. | 1 |
Colman, Sue | 1 |
Fabregat-Gesa, R. | 1 |
Gunter, Glenda A. | 1 |
Gunter, Randolph E. | 1 |
Hinga, Sophia W. | 1 |
Marzo-Lazaro, J. L. | 1 |
McCollum, Kelly | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 9 |
Journal Articles | 5 |
Speeches/Meeting Papers | 4 |
Books | 1 |
Collected Works - Proceedings | 1 |
Guides - Classroom - Learner | 1 |
Guides - Non-Classroom | 1 |
Opinion Papers | 1 |
Education Level
Audience
Practitioners | 4 |
Administrators | 2 |
Media Staff | 2 |
Students | 1 |
Location
Australia | 1 |
Canada | 1 |
New Mexico | 1 |
Spain | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
McCollum, Kelly – Chronicle of Higher Education, 2000
Describes university courses and programs in protecting computer networks and World Wide Web sites from vandals, cyberterrorists, and malicious hackers. Notes such courses are provided by East Stroudsburg University (Pennsylvania), Purdue University (Indiana), George Mason University (Virginia), and Texas A&M University. Also notes the federal…
Descriptors: College Curriculum, Computer Networks, Computer Security, Government School Relationship
Wanat, Thomas – Chronicle of Higher Education, 1997
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Descriptors: College Students, Computer Science, Computer Security, Crime

Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education

Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Colman, Sue – Australian Universities' Review, 1997
Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…
Descriptors: Access to Information, College Administration, Computer Security, Confidentiality
Hinga, Sophia W.; Chen, Linlin Irene – 1998
With the assistance of learning technology consultants in the Technology Teaching and Learning Center (TTLC) at the University of Houston-Downtown (Texas), professors have shifted their paradigms and are taking the leap to use more high-risk World Wide Web technologies in their courses. One that has become a hallmark is delivering exams via the…
Descriptors: Authoring Aids (Programming), Computer Assisted Testing, Computer Managed Instruction, Computer Security
Shelly, Gary B.; Cashman, Thomas J.; Gunter, Randolph E.; Gunter, Glenda A. – 1999
Intended for use in an introductory computer course for educators, this textbook contains the following chapters: (1) "Introduction to Using Computers in Education"; (2) "Communications, Networks, the Internet, and the World Wide Web"; (3) "Software Applications for Education,"; (4) "Hardware Applications for…
Descriptors: Computer Security, Computer Software, Computer Uses in Education, Educational Technology
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security
Marzo-Lazaro, J. L.; Verdu-Carbo, T.; Fabregat-Gesa, R. – 1998
This paper describes a solution to the user identification and tracking problem within an educational World Wide Web environment. The paper begins with an overview of the Teaching Support System project at the University of Girona (Spain); the main objective of the project is to create an integrated set of tools for teachers to use to create and…
Descriptors: Computer Interfaces, Computer Security, Computer Software Development, Computer System Design
Wright, Peter W. – 2000
Based on the author's presentation at the International Conference on Computer Based Learning in Science, this paper discuses some high profile areas of interest and concern in the educational use of information and communication technology (ICT). The paper is influenced partly by a series of nine government funded "Best Practices"…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Distance Education
Suiter, Martha, Ed. – 1995
This set of proceedings assembles papers presented at the 1995 Council for Higher Education Computing Services (CHECS) conference, held at the New Mexico Military Institute in Roswell, New Mexico. CHECS members are higher education computing services organizations within the state of New Mexico. The main focus of the conference was the Internet…
Descriptors: Access to Information, Computer Mediated Communication, Computer Security, Computer Uses in Education
Briden, Judi; Reeb, Brenda; Zhang, Allison – 1997
The Electronic Resources Team at the University of Rochester (New York) River Campus Libraries pursued the concept of one-stop shopping as a component of their new integrated library system Voyager, which debuted in January 1997. Faced with a growing variety of electronic resources with no single guide to their existence and access, the Team dealt…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Security