Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Security | 4 |
Privacy | 4 |
Computer Networks | 3 |
Computers | 3 |
Educational Technology | 3 |
Higher Education | 3 |
Information Technology | 3 |
Internet | 3 |
Academic Achievement | 2 |
Access to Education | 2 |
At Risk Students | 2 |
More ▼ |
Author
Gale, Doug | 1 |
Panettieri, Joseph C. | 1 |
Publication Type
Reports - Descriptive | 3 |
Journal Articles | 2 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 3 |
Elementary Secondary Education | 2 |
Elementary Education | 1 |
Postsecondary Education | 1 |
Secondary Education | 1 |
Audience
Location
Ohio | 4 |
Florida | 2 |
Georgia | 2 |
Indiana | 2 |
South Carolina | 2 |
Alabama | 1 |
Arizona | 1 |
Arkansas | 1 |
Asia | 1 |
Australia | 1 |
Brazil | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Foundation for Excellence in Education (ExcelinEd), 2014
A full year of progress in advancing education reform across America is documented in each of the Foundation for Excellence in Education's Annual Reports. The illustrated pages of the 2014 report, provide data-rich updates on Excellence in Education's work to advance student-centered policies in more than 40 states, all aimed at improving learning…
Descriptors: Educational Change, Educational Quality, Excellence in Education, Student Centered Learning
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers