Descriptor
Author
Briden, Judi | 1 |
Buck, S. Peter | 1 |
Carpenter, Cal | 1 |
Charnetski, J. R. | 1 |
Evans, M. P. | 1 |
Furnell, S. M. | 1 |
Hong, Pei-lin | 1 |
Hwang, Jing-Jang | 1 |
Li, Jin-sheng | 1 |
Liao, Gen-Yih | 1 |
Lorenzen, Elizabeth A., Ed. | 1 |
More ▼ |
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 6 |
Reports - Research | 4 |
Guides - Non-Classroom | 3 |
Speeches/Meeting Papers | 2 |
Opinion Papers | 1 |
Education Level
Audience
Administrators | 1 |
Parents | 1 |
Practitioners | 1 |
Location
Australia | 1 |
Malaysia | 1 |
Singapore | 1 |
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating

Buck, S. Peter – Internet Research, 1996
Discussion of use of the Internet for online payments focuses on payment mechanisms for conducting transactions. Highlights include commercial requirements; security requirements; various proposed and currently used mechanisms; and future possibilities. (LRW)
Descriptors: Banking, Computer Security, Futures (of Society), Internet
Carpenter, Cal – Learning & Leading with Technology, 1996
Considers ethics issues involved with using online resources like the Internet in elementary and secondary education and suggests that educators initiate and model a standardized role of ethical behavior for Internet users. Topics include hackers; privacy, piracy, and security; screening electronic sites; ethics education; and an ethics model.…
Descriptors: Computer Security, Elementary Secondary Education, Ethics, Internet

Liao, Gen-Yih; Hwang, Jing-Jang – Internet Research, 2001
Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)
Descriptors: Business, Computer Oriented Programs, Computer Security, Consumer Economics

Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Charnetski, J. R. – Computers in Libraries, 1998
Discusses the use of firewalls for library intranets, highlighting the move from mainframes to PCs, security issues and firewall architecture, and operating systems. Provides a glossary of basic networking terms and a bibliography of suggested reading. (PEN)
Descriptors: Bibliographies, Computer Networks, Computer Security, Computer System Design

Evans, M. P.; Furnell, S. M. – Internet Research, 2000
Explains the background to experimental work intended to measure aspects of the World Wide Web, which inadvertently caused two perceived security breaches on remote systems. Describes the nature of these incidents and considers why, when over 700,000 addresses were sampled, only two sites considered the activity to be an attempt to breach their…
Descriptors: Computer Oriented Programs, Computer Security, Computer System Design, Internet

Orr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Australian Broadcasting Authority. – 1997
In December 1996 UNESCO commissioned the Australian Broadcasting Authority to conduct a pilot study which considered a range of online issues; this report outlines the findings of the pilot study, based on data collected between February and May 1997 and updated in July 1997. The objective is to identify the main types of Internet content which…
Descriptors: Access to Information, Censorship, Comparative Analysis, Computer Security
Direct Marketing Association, Washington, DC. – 1997
The ability to meet people, visit places around the globe, and make purchases online has added a new dimension to teaching children about the opportunities and accompanying risks that exist in everyday life. The Direct Marketing Association has created this guide to information use, behavior, and privacy on the Internet to help parents supervise…
Descriptors: Computer Attitudes, Computer Security, Electronic Mail, Information Industry
Lorenzen, Elizabeth A., Ed. – 1996
This book contains 11 papers examining career planning and job searching in the information age. The following papers are included: "The Librarian's Role in the Job Search of the Future: Issues and Ethics in the Electronic Environment" (Elizabeth A. Lorenzen); "The Internet as Career, Job, and Employment Resource: Transition, Assimilation,…
Descriptors: Career Education, Career Planning, Computer Security, Ethics
Zirkle, Chris – 2001
The Internet offers trade and industrial (T&I) educators a wealth of readily available information for use as teaching aids, supplemental materials, and laboratory resources. These materials provide many distinct benefits; however, there are also several issues that must be addressed when using the Internet as an adjunct in teaching. These…
Descriptors: Access to Computers, Access to Information, Computer Security, Computer Uses in Education
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software
Briden, Judi; Reeb, Brenda; Zhang, Allison – 1997
The Electronic Resources Team at the University of Rochester (New York) River Campus Libraries pursued the concept of one-stop shopping as a component of their new integrated library system Voyager, which debuted in January 1997. Faced with a growing variety of electronic resources with no single guide to their existence and access, the Team dealt…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Security