NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 6 results Save | Export
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Mansfield, Meribah – Library Journal, 1997
Examines the Ohio Public Library Information Network (OPLIN) which provides access to the state's public library resources; federal, state, and regional information resources; and other electronic information resources. Describes OPLIN's role in Ohio, hardware and services provided, mission, origin, funding, staff training, databases, future plans…
Descriptors: Access to Information, Computer Networks, Databases, Electronic Libraries
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers