NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,351 to 1,365 of 1,640 results Save | Export
Hall, Don; Kelly, Pat – Learning & Leading with Technology, 2005
Increasingly, teachers rely on computer software and networks to both enhance curriculum management and provide engaging learning opportunities in instruction. New software is enabling more frequent formative assessments to better focus day-to-day lessons on the unique needs of individual learners. Administrators use increasingly complex data…
Descriptors: Database Management Systems, Computer Software, Academic Standards, Academic Achievement
Peer reviewed Peer reviewed
Direct linkDirect link
Luker, Mark A. – EDUCAUSE Review, 2005
Kenneth J. Klingenstein, Chief Technologist at the University of Colorado, Boulder, and Project Director of the Internet2 Middleware Initiative, is the recipient of the 2003 EDUCAUSE Award for Leadership in Information Technologies. Klingenstein has been involved in computing technology for almost three decades. One of a handful of leaders who…
Descriptors: Educational Technology, Information Technology, Distance Education, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken – EDUCAUSE Quarterly, 2004
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Descriptors: Internet, Computer Security, Computer Networks, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
What would people do without the Internet? It gives them the world at their fingertips. Almost anything that they want and need can be found in one neat little place. The Internet is a great place for kids also. They can be entertained, chat with friends, and learn about whatever interests them. Unfortunately the Internet also helps people…
Descriptors: Internet, Computer Security, Child Safety, Computer Mediated Communication
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Villano, Matt – Campus Technology, 2007
Nowadays, college and university auxiliary services departments are turning to text messaging types of technologies to move a host of programs and offerings into the mobile environment. A July 2007 study by Youth Trends indicated that 95 percent of college freshmen come to school with a cell phone or other handheld device, and 78 percent of them…
Descriptors: Higher Education, College Students, Communication Strategies, College Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Richards, Griff; Donkers, Peter; Hatala, Marek; Dufresne, Aude – Interactive Learning Environments, 2007
Campus Canada promotes lifelong learning through the articulation of workplace and other experiential learning for academic credit. This paper describes the recent re-development of the Record of Learning (RoL) component of the Campus Canada's e-Portfolio System. In matching the academic members' desires for provision of secure e-transcripts with…
Descriptors: Foreign Countries, Validity, Competence, Experiential Learning
WCET, 2008
Much attention has been focused on the accountability, student learning outcomes, transfer of credit, and illegal file sharing provisions of the two related bills that have moved through the U.S. Senate and the House of Representatives to amend and extend the provisions of the 1965 Higher Education Act (S. 1642 and H.R. 4137). One of the…
Descriptors: Higher Education, Educational Technology, Distance Education, Integrity
Telecommunications Policy Research Conference, Inc., Washington, DC. – 1987
In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…
Descriptors: Access to Information, Banking, Computer Security, Cryptography
Harrison, J. Phil – Business Officer, 1996
A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…
Descriptors: Alarm Systems, College Administration, Computer Security, Computers
Neray, Phil – Online Libraries and Microcomputers, 1997
Discusses Internet access and monitoring in light of H. G. Wells' idea of a world brain or encyclopedia, or mind of the species. Topics include the evolution and effects of Internet access, including employee productivity, network bandwidth, and legal liabilities or negative publicity; and Internet usage and security policy. (LRW)
Descriptors: Access to Computers, Access to Information, Computer Security, Internet
Wanat, Thomas – Chronicle of Higher Education, 1997
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Descriptors: College Students, Computer Science, Computer Security, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Basham, Matt – Community College Journal, 2003
Analyzes the impact of the U.S. Patriot Act on educational institutions, particularly in the area of information technology security. Warns that the Act could impact distance learning and campus Internet service providers, and that lawsuits are being filed against universities for having lax cybersecurity. Makes suggestions for dealing with these…
Descriptors: Civil Liberties, Community Colleges, Computer Security, Computers
Pages: 1  |  ...  |  87  |  88  |  89  |  90  |  91  |  92  |  93  |  94  |  95  |  ...  |  110