Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 6 |
Information Technology | 6 |
Libraries | 6 |
Internet | 5 |
Computer Software | 4 |
Computers | 4 |
Electronic Mail | 2 |
Library Automation | 2 |
Online Courses | 2 |
Teaching Methods | 2 |
Web Sites | 2 |
More ▼ |
Source
Computers in Libraries | 2 |
Association of Small Computer… | 1 |
Journal of Information… | 1 |
Library Journal | 1 |
Library Software Review | 1 |
Author
Bahr, Ellen | 1 |
Buck, Stephanie | 1 |
Friedman, Stan, Sr. | 1 |
He, Wu | 1 |
Orr, Giles | 1 |
Smith, Carol L., Ed. | 1 |
Smith, Peter, Ed. | 1 |
Yang, Li | 1 |
Yuan, Xiaohong | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 2 |
Elementary Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Massachusetts | 1 |
North Carolina | 1 |
South Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
He, Wu; Yuan, Xiaohong; Yang, Li – Journal of Information Systems Education, 2013
Case-based learning has been widely used in many disciplines. As an effective pedagogical method, case-based learning is also being used to support teaching and learning in the domain of information security. In this paper, we demonstrate case-based learning in information security by sharing our experiences in using a case study to teach security…
Descriptors: Case Method (Teaching Technique), Information Security, Internet, Information Technology
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Bahr, Ellen – Computers in Libraries, 2007
What would technological librarians like to see in the next generation of Integrated Library Systems (ILS)? This question was asked of several well- known library technology experts, and their responses are presented in this article. Survey respondents expressed a clear desire for the following features and functionality: (1) Direct, read-only…
Descriptors: Libraries, Internet, Library Automation, Computer Mediated Communication
Friedman, Stan, Sr. – Library Journal, 2004
This article describes the results of the 19th annual Computers in Libraries Conference in Washington, DC on March 10-12, 2004. The conference peered into the future, drew lessons from the past, and ran like clockwork. Program chair Jane Dysart and her organizing committee are by now old hands, bringing together three keynote addresses, 100…
Descriptors: Information Technology, Internet, Privacy, Libraries

Orr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks
Smith, Peter, Ed.; Smith, Carol L., Ed. – Association of Small Computer Users in Education (ASCUE), 2004
This 2004 Association of Small Computer Users in Education (ASCUE) conference proceedings presented the theme "Leading Strategic & Cultural Change through Technology." The conference introduced its ASCUE Officers and Directors, and provides abstracts of the pre-conference workshops. The full-text conference papers in this document…
Descriptors: Small Colleges, Computers, Student Surveys, Interaction