NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
McDermott, Maureen; Reeves, Jennifer; Mendez, Gabriela; Capo, Berta; Karp, Jason – Distance Learning, 2019
A data breach occurs when a cyberhacker physically gains access to files on a computer or remotely bypasses a network's security system, gaining access to data, and stealing sensitive information. Remote network security breaches are a common method for taking sensitive information from companies. The confidential information can then be sold on…
Descriptors: Computer Security, Information Security, Privacy, Computer Software
Clarke, Alan – Routledge, Taylor & Francis Group, 2011
The use of technology within the lifelong learning sector brings many benefits to learners, teachers and managers. Aimed at trainee and practising teachers, this book contains clear, practical guidance on how to use technology and e-learning effectively to enhance all aspects of teaching and learning in the post-compulsory sector. Alan Clarke…
Descriptors: Electronic Learning, Portfolios (Background Materials), Electronic Publishing, Discussion Groups
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Sarah; Hannah, Andrew; Stones, Dave; Morley, Robert – College and University, 2011
Electronic transcripts are no longer a concept awaiting definition. They are here to stay. Although paper transcripts remain the standard--at least in terms of volume--an ever-increasing number and eventual majority of students and alumni will expect if not require electronic transcripts. College registrars and admissions officers' obligation to…
Descriptors: Postsecondary Education, College Administration, Registrars (School), Admissions Officers