Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Interfaces | 8 |
Computer Security | 8 |
Information Technology | 8 |
Computer Networks | 5 |
Computer Software | 4 |
Computer System Design | 3 |
Computers | 3 |
Internet | 3 |
Users (Information) | 3 |
Web Sites | 3 |
Administrators | 2 |
More ▼ |
Source
Association of Small Computer… | 1 |
Campus Technology | 1 |
Educational Media… | 1 |
Information Systems Education… | 1 |
International Association for… | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
Author
Bonneau, Thomas | 1 |
Christiana Karousiou | 1 |
Dixit, R. K. | 1 |
Grush, Mary | 1 |
Marchant, Robert L. | 1 |
Reifers, Andrew | 1 |
Senn, Gary J. | 1 |
Smith, Carol L., Ed. | 1 |
Smith, Peter, Ed. | 1 |
Smyth, Thomas J. C. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Collected Works - Proceedings | 2 |
Collected Works - Serial | 1 |
Dissertations/Theses -… | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Cyprus | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Marchant, Robert L.; Bonneau, Thomas – Information Systems Education Journal, 2013
Transition from small, independent LANs into larger enterprise managed infrastructures is becoming more prominent in academia, business and government. Consolidation of IT resources into larger, more disciplined, and more professionally managed environments has significant advantages however they do bring their own unique issues to solve in order…
Descriptors: Computer Networks, Computer Security, Client Server Architecture, Computer Interfaces
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Senn, Gary J.; Smyth, Thomas J. C. – 1995
Because of the graphical interface and "openness" of the operating system, Macintosh computers are susceptible to undesirable changes by the user. This presentation discusses the advantages and disadvantages of software packages that offer protection for the Macintosh system. The two basic forms of software security packages include a…
Descriptors: Computer Interfaces, Computer Security, Computer Software Evaluation, Computer System Design
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2004
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
Descriptors: Small Colleges, Computers, Student Surveys, Interaction
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers