NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 256 to 270 of 475 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Juvonen, Jaana; Gross, Elisheva F. – Journal of School Health, 2008
Background: Bullying is a national public health problem affecting millions of students. With the rapid increase in electronic or online communication, bullying is no longer limited to schools. The goal of the current investigation was to examine the overlap among targets of, and the similarities between, online and in-school bullying among…
Descriptors: Computer Mediated Communication, Bullying, Parent Education, Internet
Gale, Doug – Campus Technology, 2007
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Descriptors: Computer Security, Prevention, Guidelines, Higher Education
Peer reviewed Peer reviewed
Liddy, Carrie – Internet Research, 1996
Discusses commercial security on the Internet and explains public key technology as successfully melding the conflicting requirements of openness for practical business applications and isolation and confidentiality for protection of data. Examples of public key value-added products are described, including encryption, digital signature and…
Descriptors: Computer Security, Confidentiality, Internet
Peer reviewed Peer reviewed
Corradi, Antonio; Montanari, Rebecca; Stefanelli, Cesare – Internet Research, 2001
Discussion of the Internet focuses on new programming paradigms based on mobile agents. Considers the security issues associated with mobile agents and proposes a security architecture composed of a wide set of services and components capable of adapting to a variety of applications, particularly electronic commerce. (Author/LRW)
Descriptors: Computer Security, Internet, Programming
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Boyle, Clifton J., III – ProQuest LLC, 2010
Misuse of technology is a behavioral pattern that continues to emerge in our society. Television and newspapers continue to list and report technology misuse. A recent study from the Pew Internet and American Life Project has indicated approximately one third of teen are victims of online harassment (Lenhart, 2009). Other prominent problems with…
Descriptors: Control Groups, Urban Schools, Citizenship, Video Games
Hyde, Hartley – Australian Mathematics Teacher, 2007
The transfer of data from one part of a computer to another has always been a complex task in which speed is traded against accuracy and the time required for error correction. Much more complex therefore is the transfer of information from one machine to another of a different type. Difficulties arise when machines are updated, when file formats…
Descriptors: Computer Software, Internet, Information Transfer, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Gao, Zhiqiang – ProQuest LLC, 2006
Denial of service (DoS) attacks and distributed denial of service (DDoS) attacks are probably the most ferocious threats in the Internet, resulting in tremendous economic and social implications/impacts on our daily lives that are increasingly depending on the well-being of the Internet. How to mitigate these attacks effectively and efficiently…
Descriptors: Internet, Computer Security, Information Technology
Ross, Virginia Watson – ProQuest LLC, 2010
Cloud computing is a growing field, addressing the market need for access to computing resources to meet organizational computing requirements. The purpose of this research is to evaluate the factors that influence an organization in their decision whether to adopt cloud computing as a part of their strategic information technology planning.…
Descriptors: Technology Planning, Information Technology, Internet, Strategic Planning
Dixit, R. K. – Online Submission, 2010
This is a special issue published in version 1.0 of "Global Journal of Computer Science and Technology." Articles in this issue include: (1) [Theta] Scheme (Orthogonal Milstein Scheme), a Better Numerical Approximation for Multi-dimensional SDEs (Klaus Schmitz Abe); (2) Input Data Processing Techniques in Intrusion Detection…
Descriptors: Diabetes, Computers, Computer Science, Telecommunications
Mejia, Robin – Chronicle of Higher Education, 2008
The need for colleges to graduate students who understand computer security is growing. The Internet Crime Complaint Center, a partnership of the FBI; the National White Collar Crime Center; and the Bureau of Justice Assistance, in the Department of Justice, reported more than 90,000 crimes in 2007, with reported financial losses of almost…
Descriptors: College Students, Crime Prevention, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, Doohwang; Larose, Robert; Rifon, Nora – Behaviour & Information Technology, 2008
The objective of this study is to develop and test a model of online protection behaviour, particularly regarding the use of virus protection. Hypotheses are proposed concerning the predictors of the intention to engage in virus protection behaviour. Using a survey of 273 college students who use the Internet, a test of the hypotheses is conducted…
Descriptors: Self Efficacy, Intention, Computer Security, Multiple Regression Analysis
Peer reviewed Peer reviewed
Martin, Kelly – T.H.E. Journal, 2004
It used to be that Internet threats were aimed at disabling their targets. The most common payload of yesterday's viruses, worms and other malicious code either caused system instability or, perhaps, deleted certain files. In many cases, these threats announced their arrival by flashing messages on the computer screen or causing some other…
Descriptors: Computer Security, Computer Software, Privacy, Internet
Peer reviewed Peer reviewed
Lozano-Hemmer, Rafael; Gomez-Pena, Guillermo – Aztlan: A Journal of Chicano Studies, 2004
The leaked documents of the tech-illa network are investigated. It was unclear that if the information was left in the cracked server on purpose, to be distributed by the hackers as a decoy.
Descriptors: Internet, Computer Networks, Computer Security, Crime
Pages: 1  |  ...  |  14  |  15  |  16  |  17  |  18  |  19  |  20  |  21  |  22  |  ...  |  32