Publication Date
In 2025 | 7 |
Since 2024 | 60 |
Since 2021 (last 5 years) | 108 |
Since 2016 (last 10 years) | 231 |
Since 2006 (last 20 years) | 806 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 400 |
Teachers | 174 |
Administrators | 148 |
Policymakers | 90 |
Media Staff | 56 |
Researchers | 54 |
Students | 24 |
Parents | 12 |
Community | 5 |
Counselors | 2 |
Location
Canada | 95 |
United States | 80 |
United Kingdom | 59 |
Australia | 47 |
California | 38 |
Texas | 33 |
Japan | 30 |
New York | 30 |
Florida | 25 |
Pennsylvania | 25 |
Finland | 22 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Does not meet standards | 1 |
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
Finn, Gregory G. – 1987
This report discusses some of the problems and limitations in existing internetwork design for the connection of packet-switching networks of different technologies and presents an algorithm that has been shown to be suitable for internetworks of unbounded size. Using a new form of address and a flat routing mechanism called Cartesian routing,…
Descriptors: Algorithms, Computer Networks, Computer System Design, Models
Parker, Donald C. – Executive Educator, 1987
Describes an electronic mail system used by the Horseheads (New York) Central School Distict's eight schools and central office that saves time and enhances productivity. This software calls up information from the district's computer network and sends it to other users' special files--electronic "mailboxes" set aside for messages and…
Descriptors: Computer Networks, Efficiency, Electronic Mail, Elementary Secondary Education

Huang, Albert H. – Journal of Education for Business, 1997
Online training through computer networks allows the provision of emotional support, privacy, objective performance evaluation, and resource sharing. Trainers must learn new presentation and advising skills. Trainees need to be self-motivated and computer literate. (SK)
Descriptors: Computer Assisted Instruction, Computer Networks, Internet, Online Systems
Olsen, Florence – Chronicle of Higher Education, 2003
Describes how California's Peralta Community Colleges District decided to hire an outside company to manage its computer networks, but that problems cause it to now want a technology boss on its own staff. (EV)
Descriptors: Computer Networks, Computer Uses in Education, Information Technology, Problems
Stamps, David – Training, 1997
Information technology is not enough without knowledge management. People who oversee and support knowledge management are essential. The move to knowledge management systems may eclipse training and development unless trainers help people learn about learning and about sharing their knowledge. (JOW)
Descriptors: Adult Education, Computer Networks, Information Technology, Organizational Development
Wodarz, Nan – School Business Affairs, 1997
The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…
Descriptors: Computer Networks, Computer Security, Elementary Secondary Education, Internet
Nilsson, Fredrik – American School & University, 2002
Discusses affordable and practical security solutions, such as networked video systems, that are available to meet schools' needs for highly functional, low-cost surveillance. (EV)
Descriptors: Computer Networks, Crime Prevention, School Safety, Schools
King, Kenneth M. – EDUCOM Bulletin, 1988
Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)
Descriptors: Computer Networks, Computer Software, Computer Uses in Education, Ethics

Bechar-Israeli, Haya – Journal of Computer-Mediated Communication, 1995
Examines nicknames of Internet Relay Chat (IRC) users, whose identities are condensed into a single line which states their nicknames, the electronic address, and a slogan or the users' real names. Demonstrates that although people play games with their nicknames, the nicknames they choose are an inherent part of their Net identity and their…
Descriptors: Computer Mediated Communication, Computer Networks, Higher Education, Identification (Psychology)
Machovec, George S. – Online Libraries and Microcomputers, 1994
Describes Mosaic, an Internet resource locator and navigation tool developed at the University of Illinois' National Center for Super-Computing Applications (NCSA). Topics discussed include the relationship with the World Wide Web; flexibility; obtaining Mosaic client software; and file transfer protocol instructions. (Contains seven references.)…
Descriptors: Computer Networks, Computer Software, File Transfer Protocol, Information Networks

van Brakel, Pieter A.; And Others – Electronic Library, 1995
Provides guidelines for home page design, and suggests that the physical appearance of a home page is similar to that of a good graphical user interface. In designing a complete home page file, the premise is that basic hypertext design principles could also be applied in the World Wide Web environment. (Author/JKP)
Descriptors: Computer Graphics, Computer Networks, Guidelines, Hypermedia

Hatfield, Thomas H. – Journal of Environmental Health, 1995
This article has three objectives: (1) introduce the basics of the World Wide Web (including Internet connectivity, hypertext, and uniform resource locators); (2) highlight environmental health databases on the Web; and (3) discuss possible applications of the Web for the environmental health profession. (LZ)
Descriptors: Computer Networks, Computer Software, Databases, Educational Resources

Lowry, Charles B. – Library Hi Tech, 1995
Discusses how information technology and information retrieval may be used to build the virtual library, based on examples from Carnegie-Mellon University. Topics include information technology infrastructure, including distributed computing; Boolean searching; natural language processing; navigating the Internet; and prototypes and problems at…
Descriptors: Computer Networks, Higher Education, Information Retrieval, Information Technology

Taylor, Janet H.; Ryan, Joe – Internet Research, 1995
Discussion of museums that take advantage of the Internet's format options for electronic presentation. Provides a list of 248 museums and galleries around the world that are making use of World Wide Web or Gopher servers, lists 4 recent pertinent articles, and lists 8 online directories. (Author/LRW)
Descriptors: Arts Centers, Computer Networks, Information Sources, Museums