NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,426 to 1,440 of 1,635 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – Technology, Pedagogy and Education, 2008
In the last decade, Internet provision has become widespread within schools in many economically developed countries. Proponents of such technology have stressed the potential benefits to be gained from innovative teaching and learning opportunities. Yet, herein purity and danger are seen to co-exist, with unregulated "pollutants"…
Descriptors: Internet, Foreign Countries, Discourse Analysis, Technology Integration
General Accounting Office, Washington, DC. – 1995
This report focuses on the pivotal technical issues associated with the National Information Infrastructure program, security and privacy, interoperability, and reliability, and presents the General Accounting Office's findings on these challenges. It is reported that while the structures and services to be offered by the information superhighway…
Descriptors: Communications, Computer Networks, Computer Security, Confidentiality
Khosrowpour, Mehdi; Amoroso, Donald – 1991
With the realization that microcomputers provide an extraordinary value to the organization follows the need to address a variety of issues in order to more effectively manage these resources. Each of the 14 chapters, consisting of papers written by different authors, represents a different perspective existing in organizations with respect to the…
Descriptors: Administration, Artificial Intelligence, Computer Science Education, Computer Security
National Association of State Universities and Land-Grant Colleges, 2004
This document represents the higher education and library community's guiding public policy agenda on information technology (IT) for the current year. The Higher Education Information Technology (HEIT) Alliance is a coalition of 11 national higher education and library associations, whose members represent a broad array of stakeholders on college…
Descriptors: Telecommunications, Library Associations, Information Technology, Intellectual Property
Nelson, Jesse – Media & Methods, 1997
Discusses the benefits of school library security, software security, and computer security systems. Describes specific products for each type of security system. A sidebar lists names and addresses of security manufacturers and distributors. (AEF)
Descriptors: Alarm Systems, Computer Security, Computer Software, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software
Wodarz, Nan – School Business Affairs, 1999
Describes a technology consultant's training of promising students as network administrators as part of a high-school work-study program. Success hinged on combining work with education, providing supervision and mentoring, using knowledgeable trainers, not substituting students for staff shortcomings, and installing adequate computer security.…
Descriptors: Computer Networks, Computer Security, Consultants, Cooperative Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Leino, Kaisa – Scandinavian Journal of Educational Research, 2006
This study explores the perceptions of Finnish 15-year-olds on the advantages and disadvantages of the Internet. The data, students' written responses (N = 3112), were gathered in the context of the OECD Programme for International Student Assessment (PISA) in the spring of 2000 as a national option. The data were analysed by close reading and…
Descriptors: Foreign Countries, Adolescents, Internet, Student Attitudes
Peer reviewed Peer reviewed
McKimmy, Paul B. – International Journal of Instructional Media, 2005
In April 2002, the Technology Advisory Committee of the University of Hawaii-Manoa College of Education (COE) prioritized the upgrade of existing instructional computer labs. Following several weeks of research and discussion, a decision was made to support wireless and mobile technologies during the upgrade. In June 2002, the first of three…
Descriptors: Resource Allocation, Costs, Educational Technology, Telecommunications
Lafee, Scott – School Administrator, 2005
In an era of digital technologies, school districts find themselves on a cutting edge, one that slices both ways. Technological tools like the Internet, e-mail, networked computers and such have revolutionized the way children are taught and schools are run, but they also have created new management challenges and ethical issues that many school…
Descriptors: Educational Technology, Computer Uses in Education, Computer Security, Ethics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McGreal, Rory – International Review of Research in Open and Distance Learning, 2004
The Internet is the world's largest knowledge common and the information source of first resort. Much of this information is open and freely available. However, there are organizations and companies today that are trying to close off the Internet commons and make it proprietary. These are the "copyright controllers." The preservation of the…
Descriptors: Copyrights, Information Sources, Internet, Ethics
Peer reviewed Peer reviewed
Direct linkDirect link
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Hsin, Wen-Jung – InSight: A Collection of Faculty Scholarship, 2007
This paper introduces several hands-on projects that have been used to motivate students in learning various computer networking concepts. These projects are shown to be very useful and applicable to the learners' daily tasks and activities such as emailing, Web browsing, and online shopping and banking, and lead to an unexpected byproduct,…
Descriptors: Student Motivation, Internet, Computer Networks, Computer Science Education
Pages: 1  |  ...  |  92  |  93  |  94  |  95  |  96  |  97  |  98  |  99  |  100  |  ...  |  109