Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Networks | 15 |
Computer Security | 15 |
Information Networks | 15 |
Access to Information | 5 |
Computer Mediated… | 5 |
Computer System Design | 5 |
Internet | 5 |
Information Policy | 4 |
Information Technology | 4 |
Privacy | 4 |
Information Services | 3 |
More ▼ |
Source
Author
Bedi, Param | 1 |
Cole, Timothy W. | 1 |
Galbreath, Jeremy, Ed. | 1 |
Garrison, William V. | 1 |
Hong, Pei-lin | 1 |
Horn, G. | 1 |
Keromytis, Angelos | 1 |
Kroselberg, D. | 1 |
Li, Jin-sheng | 1 |
Littman, Marlyn Kemper | 1 |
McClellan, Gregory A. | 1 |
More ▼ |
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 7 |
Reports - Research | 4 |
Reports - Evaluative | 2 |
Speeches/Meeting Papers | 2 |
Books | 1 |
Collected Works - General | 1 |
Guides - General | 1 |
Legal/Legislative/Regulatory… | 1 |
Opinion Papers | 1 |
Education Level
Higher Education | 2 |
Elementary Secondary Education | 1 |
Location
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
National Forum on Education Statistics, 2020
The purpose of this document is to provide timely and useful best practice information to help education agencies proactively prepare for, appropriately mitigate, and responsibly recover from a cybersecurity incident. This resource reflects lessons learned by the education community and provides recommendations that will help agencies protect…
Descriptors: Information Security, Computer Security, Confidential Records, Information Management
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy

Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design

McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Bedi, Param – Association of Small Computer Users in Education (ASCUE), 2005
This paper discusses how to implement networking solutions in residence halls at Arcadia University in Philadelphia. Sections of the paper include: (1) About Arcadia University; (2) Residence Halls Network; (3) How Campus Manager Helped Arcadia University; (4) What Is Campus Manager; (5) How Campus Manager Works; (6) Campus Manager Remediation…
Descriptors: Computer Networks, Private Colleges, Computer Uses in Education, Information Networks
General Accounting Office, Washington, DC. – 1995
This report focuses on the pivotal technical issues associated with the National Information Infrastructure program, security and privacy, interoperability, and reliability, and presents the General Accounting Office's findings on these challenges. It is reported that while the structures and services to be offered by the information superhighway…
Descriptors: Communications, Computer Networks, Computer Security, Confidentiality

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering

Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Institute for Information Studies, Queenstown, MD. – 1999
This collection of commissioned papers provides a variety of perspectives on the impact of global information networks. The following articles are included: "The Promise of Global Networks: An Introduction" (Jorge Reina Schement); "Architecture and Expectations: Networks of the World--Unite!" (Marjory S. Blumenthal); "The…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Security
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography
Littman, Marlyn Kemper – Journal of Online Learning, 1998
Explores capabilities of extranets (collaborative information networks between partner institutions) from the perspective of the school and university environment. Introduces distinctive features. Presents strategies and techniques for facilitating the extranet design and implementation process and delineates tactics for safeguarding extranets…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Galbreath, Jeremy, Ed. – Educational Technology, 1997
Examines the "reality behind the hype" surrounding the Internet. Discusses its early development; growth and present state; and key applications, including e-mail, voice/video telephony, integrated messaging, electronic commerce, the World Wide Web, and Web commerce, Intranet, Extranet; education and training; security; ownership; and…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Oriented Programs, Computer Security
Cole, Timothy W. – Computers in Libraries, 1995
Describes installation and configuration of Mosaic and a World Wide Web (WWW) site at Grainger Library. Challenges include choosing a WINSOCK; customizing Mosaic for public-access computers; reducing security risks; maximizing Multipurpose Internet Mail Extensions (MIME); designing a home page; producing Hypertext Markup Language (HTML) documents.…
Descriptors: Academic Libraries, Computer Networks, Computer Security, Computer Software Development