NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 391 to 405 of 475 results Save | Export
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Direct linkDirect link
Leino, Kaisa – Scandinavian Journal of Educational Research, 2006
This study explores the perceptions of Finnish 15-year-olds on the advantages and disadvantages of the Internet. The data, students' written responses (N = 3112), were gathered in the context of the OECD Programme for International Student Assessment (PISA) in the spring of 2000 as a national option. The data were analysed by close reading and…
Descriptors: Foreign Countries, Adolescents, Internet, Student Attitudes
Lafee, Scott – School Administrator, 2005
In an era of digital technologies, school districts find themselves on a cutting edge, one that slices both ways. Technological tools like the Internet, e-mail, networked computers and such have revolutionized the way children are taught and schools are run, but they also have created new management challenges and ethical issues that many school…
Descriptors: Educational Technology, Computer Uses in Education, Computer Security, Ethics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McGreal, Rory – International Review of Research in Open and Distance Learning, 2004
The Internet is the world's largest knowledge common and the information source of first resort. Much of this information is open and freely available. However, there are organizations and companies today that are trying to close off the Internet commons and make it proprietary. These are the "copyright controllers." The preservation of the…
Descriptors: Copyrights, Information Sources, Internet, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Kafai, Yasmin B.; Nixon, Althea Scott; Burnam, Bruce – Journal of Technology and Teacher Education, 2007
With increased computer technology use in schools, preservice teachers must be prepared to deal with ethical issues involved in a range of computer uses, such as students plagiarizing from the Internet or accessing adults-only web sites. We investigated preservice teachers' judgments regarding several scenarios of student uses of the computer and…
Descriptors: Internet, Preservice Teachers, Ethics, Preservice Teacher Education
McQuade, Samuel C., III – Chronicle of Higher Education, 2007
A growing body of empirical research strongly suggests that adolescents and young adults are increasingly becoming both victims and perpetrators of crime and abuse enabled by information technology. The US federal government has stressed technological, legislative, and law-enforcement solutions to these problems. Efforts to protect children have…
Descriptors: Higher Education, Young Adults, Information Technology, Federal Government
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – Technology, Pedagogy and Education, 2008
In the last decade, Internet provision has become widespread within schools in many economically developed countries. Proponents of such technology have stressed the potential benefits to be gained from innovative teaching and learning opportunities. Yet, herein purity and danger are seen to co-exist, with unregulated "pollutants"…
Descriptors: Internet, Foreign Countries, Discourse Analysis, Technology Integration
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hsin, Wen-Jung – InSight: A Collection of Faculty Scholarship, 2007
This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners' daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct,…
Descriptors: Student Motivation, Internet, Computer Networks, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2007
The Eighth Annual EDUCAUSE Current Issues Survey asked campus information technology leaders to rate the most critical IT challenges facing them, their campuses, and/or their systems. Four findings associated with all respondents to this year's survey merit special mention. First, for the 2007 survey, the CIC decided to split a key issue choice…
Descriptors: Information Systems, Information Technology, Computer Uses in Education, Computer Security
Australian Broadcasting Authority. – 1997
In December 1996 UNESCO commissioned the Australian Broadcasting Authority to conduct a pilot study which considered a range of online issues; this report outlines the findings of the pilot study, based on data collected between February and May 1997 and updated in July 1997. The objective is to identify the main types of Internet content which…
Descriptors: Access to Information, Censorship, Comparative Analysis, Computer Security
Machovec, George S. – Online Libraries and Microcomputers, 1997
Provides an overview of the electronic journal market and focuses on publishers doing innovative projects. Discusses predominate market models; publishers and the Internet; issues surrounding electronic journals: pricing, security, electronic page layout, copyright, backfile availability, reliability, and accessibility. Highlights selected…
Descriptors: Access to Information, Computer Security, Copyrights, Electronic Journals
Peer reviewed Peer reviewed
Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Mudge, Stephen M. – Innovations in Education and Training International, 1999
Discusses advantages and disadvantages of using the Internet for delivering teaching modules and makes recommendations for successful use of the Internet. Highlights include the availability of information at all times and from remote locations, multimedia capabilities, infrastructure needed, security issues, updating, needed skills, and…
Descriptors: Access to Information, Computer Assisted Instruction, Computer Literacy, Computer Security
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Pages: 1  |  ...  |  22  |  23  |  24  |  25  |  26  |  27  |  28  |  29  |  30  |  31  |  32