NotesFAQContact Us
Collection
Advanced
Search Tips
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 15 results Save | Export
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Henninger, Jessamyn; Aber, Susan Ward – Issues in Science and Technology Librarianship, 2010
Systems Architects and Information Technology administrators working in higher education help faculty, staff, and student computer users. Yet, who helps them? What resources do these professionals value? A case study was conducted using purposeful sampling and data collection through electronic interview to gather the preferred information-seeking…
Descriptors: Information Technology, Administrators, Higher Education, Resources
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2008
How do IT managers protect their staff from working excessively long hours? To begin addressing the problem of overworked staff, IT managers should educate themselves about legal regulations governing time spent at work. Failure to meet such requirements can expose a university to potentially expensive and embarrassing lawsuits. In this article,…
Descriptors: Legal Problems, Information Technology, Working Hours, Computer Networks
Houston, Melissa; Goggins, Patrick – Technology & Learning, 2008
It used to be much easier to get paid by the San Diego Unified School District (SDUSD). A lot easier, that is, if you didn't work there. Saddled with an antiquated computer system and manual, repetitive data entry of time cards, officials at California's second-largest school district discovered the payroll department was mistakenly issuing $1…
Descriptors: Management Systems, Employees, Computers, School Districts
Alley, Lee; Willits, Stephen D. – CAUSE/EFFECT, 1988
Integrated Services Digital Network (ISDN) promises to integrate voice, data, text, and video services within the context of existing telephone networks. It is a set of standards, or engineering design specifications, that will permit anyone to attach any innovative device to it as long as it abides by the network's protocols. (MLW)
Descriptors: Administrators, College Administration, Computer Networks, Data Processing
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Brumbaugh, Kenneth E.; McRae, Mary S. – Community College Journal of Research and Practice, 1995
Provides information designed to assist administrators in utilizing the advanced information technologies available on the Internet. Describes the uses of such elements of the Internet as "e-mail,""ftp (file transfer protocol),""gopher," and "telnet." Indicates that administrators can use the internet to…
Descriptors: Administrator Guides, Administrators, Community Colleges, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Review, 2007
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2006 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Computer Software, Telecommunications, Computer Networks, Computer Uses in Education
CAUSE, Boulder, CO. – 1991
Six papers from the 1990 CAUSE conference's Track II, Challenges and Opportunities of Information Technology in the 90s are presented. The papers focus on daily funding and accountability problems, the related management of growth, and funding relationships in higher education. Papers and their authors are as follows: "Achieving Excellence in…
Descriptors: Administrators, Budgeting, Case Studies, Change Agents
EDUCOM Review, 1993
Examines plans for the cooperative extension service of the U.S. Department of Agriculture (USDA) and includes background on the director for communication, information, and technology, Janet Poley. Highlights include the use of new technology and major trends shaping future plans, including networking, globalization, organizational restructuring,…
Descriptors: Administrators, Agricultural Education, Computer Networks, Developing Nations
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Lopata, Cynthia L.; McClure, Charles R. – 1996
The provision of network access, resources, and services to members of the academic community is becoming an area of utmost interest and importance to academic administrators, faculty, and students. As the demand from network users grows rapidly, many network administrators are asking for resources to meet that demand; their requests are being met…
Descriptors: Administrators, Computer Networks, Computer Uses in Education, Computers