Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 13 |
Descriptor
Computer Networks | 80 |
Information Management | 80 |
Information Technology | 80 |
Higher Education | 43 |
Information Systems | 26 |
Information Networks | 21 |
Technological Advancement | 21 |
Internet | 19 |
Computer Uses in Education | 18 |
Information Services | 17 |
College Administration | 16 |
More ▼ |
Source
Author
Williams, Martha E., Ed. | 3 |
Adler, Prudence | 1 |
Ahmed, Pervaiz K. | 1 |
Amin, Rohan Mahesh | 1 |
Baker, Nick | 1 |
Beer, Robert | 1 |
Bertot, John Carlo | 1 |
Blake, Cecil | 1 |
Bolch, Matt | 1 |
Bristow, Rob | 1 |
Bull, G. M. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 9 |
Elementary Secondary Education | 2 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Practitioners | 17 |
Administrators | 14 |
Media Staff | 1 |
Policymakers | 1 |
Teachers | 1 |
Location
Netherlands | 3 |
United Kingdom | 3 |
Australia | 2 |
Canada | 2 |
Germany | 2 |
Ireland | 2 |
New York | 2 |
Oklahoma | 2 |
Texas | 2 |
United Kingdom (England) | 2 |
Alaska | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Sheng, Bo – ProQuest LLC, 2010
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but…
Descriptors: Influence of Technology, Time, Efficiency, Information Technology
Collins, Hilton – Education Digest: Essential Readings Condensed for Quick Review, 2012
No matter how many car washes or bake sales schools host to raise money, adding funds to their coffers is a recurring problem. This perpetual financial difficulty makes expansive technology purchases or changes seem like a pipe dream for school CIOs and has education technologists searching for ways to stretch money. In 2005, state K-12 school…
Descriptors: Educational Technology, Information Technology, Elementary Secondary Education, Public Libraries
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Tirgari, Vesal – ProQuest LLC, 2010
The phenomenological study explored the lived experiences and perceptions of a purposive sample of 20 IT professionals (managers, engineers, administrators, and analysts) in the state of Virginia, Texas, and Washington DC. The focus of this research study was to learn the perceptions of IT professionals who are or once were in a decision-making…
Descriptors: Information Technology, Professional Personnel, Attitudes, Phenomenology
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Schaffer, Greg – Campus Technology, 2007
Managing resource usage and data delivery with virtualization devices is a staple of many of today's data infrastructures. By breaking the traditional direct physical access and inserting an abstraction layer, what one sees is what he/she gets, but the mechanics of delivery may be quite different. The reason for the increase in virtualization…
Descriptors: Higher Education, Computer Networks, Information Technology, Methods
O'Hanlon, Charlene – Campus Technology, 2007
Traditionally, the high-performance computing (HPC) systems used to conduct research at universities have amounted to silos of technology scattered across the campus and falling under the purview of the researchers themselves. This article reports that a growing number of universities are now taking over the management of those systems and…
Descriptors: Computers, Researchers, Information Management, Research Universities
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Fortino, Giancarlo; Russo, Wilma; Palau, Carlos E. – Interactive Technology and Smart Education, 2006
In this paper we present a CDN-based system, namely the COMODIN system, which is a media on-demand platform for synchronous cooperative work which supports an explicitly-formed cooperative group of distributed users with the following integrated functionalities: request of an archived multimedia session, sharing of its playback, and collaboration…
Descriptors: Cooperative Learning, Synchronous Communication, Video Technology, Information Technology

Fore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Ryan, Joe – Proceedings of the ASIS Annual Meeting, 1993
Defines information infrastructures; discusses their development; and identifies their characteristics, including the technological base and the social context, benefits, costs, governance issues, and needs for future research. Information management literature is reviewed, and the National Research and Education Network is discussed. (Contains 67…
Descriptors: Computer Networks, Costs, Governance, Information Management
Freeman, Grey; York, Jerry – CAUSE/EFFECT, 1991
This article discusses the emergence of the client/server paradigm for the delivery of computer applications, its emergence in response to the proliferation of microcomputers and local area networks, the applicability of the model in academic institutions, and its implications for college campus information technology organizations. (Author/DB)
Descriptors: Computer Networks, Delivery Systems, Higher Education, Information Management
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken – EDUCAUSE Quarterly, 2004
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Descriptors: Internet, Computer Security, Computer Networks, Information Technology