Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 7 |
Computer System Design | 7 |
Online Systems | 7 |
Computer Networks | 4 |
Internet | 4 |
Computer Mediated… | 2 |
Educational Technology | 2 |
Information Technology | 2 |
Problems | 2 |
Barriers | 1 |
Bibliographies | 1 |
More ▼ |
Source
Internet Research | 3 |
Computers in Libraries | 1 |
Information Management &… | 1 |
Journal of Information… | 1 |
Online Journal of Distance… | 1 |
Author
Brown, Victoria | 1 |
Burd, Stephen D. | 1 |
Charnetski, J. R. | 1 |
Conway, Christopher | 1 |
Evans, M. P. | 1 |
Furnell, S. M. | 1 |
Hong, Pei-lin | 1 |
Li, Jin-sheng | 1 |
Miladinovic, Igor | 1 |
Seazzu, Alessandro F. | 1 |
Stadler, Johannes | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Research | 3 |
Reports - Descriptive | 2 |
Reports - Evaluative | 2 |
Guides - Non-Classroom | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brown, Victoria – Online Journal of Distance Learning Administration, 2018
Protection of academic integrity in online environments can be challenging. Understanding how the technology works and concerns about each of the methods for monitoring online interactions can assist in the selection of the best proctoring tools. Depending on the content, the type of assessment and the comfort level with the technology, a…
Descriptors: Integrity, Online Courses, Technology Uses in Education, Identification
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks

Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Charnetski, J. R. – Computers in Libraries, 1998
Discusses the use of firewalls for library intranets, highlighting the move from mainframes to PCs, security issues and firewall architecture, and operating systems. Provides a glossary of basic networking terms and a bibliography of suggested reading. (PEN)
Descriptors: Bibliographies, Computer Networks, Computer Security, Computer System Design

Evans, M. P.; Furnell, S. M. – Internet Research, 2000
Explains the background to experimental work intended to measure aspects of the World Wide Web, which inadvertently caused two perceived security breaches on remote systems. Describes the nature of these incidents and considers why, when over 700,000 addresses were sampled, only two sites considered the activity to be an attempt to breach their…
Descriptors: Computer Oriented Programs, Computer Security, Computer System Design, Internet

Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Vane-Tempest, Stewart – Information Management & Technology, 1995
Presents a guide for selecting an optional disc system. Highlights include storage hierarchy; standards; data life cycles; security; implementing an optical jukebox system; optimizing the system; performance; quality and reliability; software; cost of online versus near-line; and growing opportunities. Sidebars provide additional information on…
Descriptors: Computer Security, Computer Selection, Computer System Design, Data