Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
OCLC Online Computer Library… | 2 |
ProQuest LLC | 2 |
Advanced Distributed Learning… | 1 |
Electronic Library | 1 |
International Association for… | 1 |
Journal of Applied… | 1 |
Journal of Educational Data… | 1 |
T.H.E. Journal | 1 |
Author
Amin, Rohan Mahesh | 1 |
Barrera-Gomez, Julianna | 1 |
Edwards, John | 1 |
Ely, Donald P. | 1 |
Erway, Ricky | 1 |
Handorf, C. Russell | 1 |
Hart, Kaden | 1 |
Hayden, Trey | 1 |
Herman, Nancy | 1 |
Johnson, Andy | 1 |
Khosrow-Pour, Mehdi | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 6 |
Journal Articles | 4 |
Dissertations/Theses -… | 2 |
Guides - Non-Classroom | 2 |
Reports - Research | 2 |
Books | 1 |
Collected Works - Proceedings | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 3 |
Elementary Secondary Education | 2 |
Postsecondary Education | 2 |
High Schools | 1 |
Secondary Education | 1 |
Audience
Media Staff | 2 |
Administrators | 1 |
Practitioners | 1 |
Location
Asia | 1 |
Australia | 1 |
Brazil | 1 |
Connecticut | 1 |
Denmark | 1 |
Egypt | 1 |
Estonia | 1 |
Florida | 1 |
Germany | 1 |
Greece | 1 |
Hawaii | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
ACT Assessment | 1 |
What Works Clearinghouse Rating
Smith, Brent; Johnson, Andy; Hayden, Trey; Tolk, Florian – Advanced Distributed Learning Initiative, 2022
The human capital supply chain is a complex network of systems with inherent challenges to accommodating Total Learning Architecture (TLA) operability. This document covers the objective end-state for Department of Defense (DoD) learning organizations migrating to TLA compliant data and microservices. This document is organized into sections that…
Descriptors: Human Capital, Public Agencies, Armed Forces, Information Systems
Edwards, John; Hart, Kaden; Shrestha, Raj – Journal of Educational Data Mining, 2023
Analysis of programming process data has become popular in computing education research and educational data mining in the last decade. This type of data is quantitative, often of high temporal resolution, and it can be collected non-intrusively while the student is in a natural setting. Many levels of granularity can be obtained, such as…
Descriptors: Data Analysis, Computer Science Education, Learning Analytics, Research Methodology
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Kool, Wouter; van der Werf, Titia; Lavoie, Brian – OCLC Online Computer Library Center, Inc., 2014
The Preservation Health Check (PHC) project, undertaken as a joint effort by Open Planets Foundation (OPF) and OCLC Research, aims to evaluate the usefulness of the preservation metadata created and maintained by operational repositories for assessing basic preservation properties. The PHC project seeks to develop an implementable logic to support…
Descriptors: Information Storage, Metadata, Information Management, Computer Security
Walk This Way: Detailed Steps for Transferring Born-Digital Content from Media You Can Read In-House
Barrera-Gomez, Julianna; Erway, Ricky – OCLC Online Computer Library Center, Inc., 2013
This document is a companion to the report, "You've Got to Walk before You Can Run: First Steps for Managing Born-Digital Content Received on Physical Media." Like the "First Steps" report, the intended audience is those who are just starting to manage born-digital materials, from those wondering where to begin, to those who…
Descriptors: Archives, Electronic Publishing, Documentation, Computer Software
Rednic, Emanuil; Toma, Andrei – Journal of Applied Quantitative Methods, 2009
In database security, the issue of providing a level of security for multimedia information is getting more and more known. For the moment the security of multimedia information is done through the security of the database itself, in the same way, for all classic and multimedia records. So what is the reason for the creation of a security…
Descriptors: Computer Security, Management Systems, Databases, Multimedia Materials
Waters, John K. – T.H.E. Journal, 2010
There was a time when school districts showed little interest in storing or backing up their data to remote servers. Nothing seemed less secure than handing off data to someone else. But in the last few years the buzz around cloud storage has grown louder, and the idea that data backup could be provided as a service has begun to gain traction in…
Descriptors: Elementary Secondary Education, School Districts, Data, Information Storage
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis

Khosrow-Pour, Mehdi; Herman, Nancy – Electronic Library, 2001
Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…
Descriptors: Computer Security, Delphi Technique, Electronic Mail, International Law
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines
Ely, Donald P. – 1997
The definition, role, and functions of "library" are changing. The National Library of Education (NLE) is in transition from a traditional library to a virtual library encompassing "one stop [any stop] shopping" through conventional and digital means. To adequately plan for the transition, the customer and potential customers…
Descriptors: Access to Computers, Access to Information, Computer Security, Copyrights
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers