Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 8 |
Descriptor
Computer Networks | 9 |
Information Technology | 9 |
Computer Security | 6 |
Internet | 5 |
College Students | 4 |
Computers | 4 |
Higher Education | 4 |
Access to Information | 3 |
Computer Software | 3 |
Educational Technology | 3 |
Handheld Devices | 3 |
More ▼ |
Source
Campus Technology | 2 |
Chronicle of Higher Education | 2 |
EDUCAUSE Quarterly | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
Journal of Information… | 1 |
Author
Agee, Anne | 1 |
Gale, Doug | 1 |
Howard, Elizabeth V. | 1 |
Larson, Scott | 1 |
Li, Chengcheng | 1 |
McDavis, Roderick J. | 1 |
New, Jake | 1 |
Panettieri, Joseph C. | 1 |
Rowe, Theresa | 1 |
Woo, Melissa | 1 |
Woods, David | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 7 |
Collected Works - Proceedings | 1 |
Dissertations/Theses | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Location
Ohio | 9 |
Indiana | 2 |
Massachusetts | 2 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Agee, Anne; Rowe, Theresa; Woo, Melissa; Woods, David – EDUCAUSE Quarterly, 2010
A 2006 ECAR study defined cyberinfrastructure as the coordinated aggregate of "hardware, software, communications, services, facilities, and personnel that enable researchers to conduct advanced computational, collaborative, and data-intensive research." While cyberinfrastructure was initially seen as support for scientific and…
Descriptors: Research Needs, Research and Development, Research Universities, Computer Uses in Education
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Larson, Scott – 1996
This study is an attempt to do the following: (1) determine the extent that CD-ROM databases are used by librarians and patrons in Ohio law libraries; (2) define librarian and patron research preferences comparing CD-ROM, print, and online resources; (3) track general trends in law library acquisition of CD-ROM databases; (4) examine the degree of…
Descriptors: Access to Information, Computer Networks, Databases, Information Services
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers