NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,396 to 1,410 of 1,635 results Save | Export
Carlson, Scott; Foster, Andrea L. – Chronicle of Higher Education, 2002
Describes how many college officials are confused by the USA Patriot Act, a new anti-terrorism law that may affect campus networks and library records; they believe its provisions could raise privacy and academic freedom issues. (EV)
Descriptors: Academic Freedom, Compliance (Legal), Computer Security, Confidential Records
Fryer, Wesley – Technology & Learning, 2004
There has long been a power struggle between techies and teachers over classroom computer desktops. IT personnel tend to believe allowing "inept" educators to have unfettered access to their computer's hard drive is an open invitation for trouble. Conversely, teachers often perceive tech support to be "uncaring" adversaries standing in the way of…
Descriptors: Teachers, Educational Innovation, Computer Software, Computer Uses in Education
Sendze, Monique – Computers in Libraries, 2006
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Descriptors: Workstations, Public Libraries, Library Services, Library Role
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2014
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Conferences (Gatherings), Conference Papers, Computer Uses in Education, Small Colleges
Peer reviewed Peer reviewed
Direct linkDirect link
Starkman, Neal – T.H.E. Journal, 2007
Through conversations with students across different grade levels, there is clear evidence that two of the things they most desire contradict each other--and they use electronic technology to get both of them. This author had conversations with three groups of students in Seattle about their favorite electronic technologies, and any concerns they…
Descriptors: Privacy, High School Students, Computer Mediated Communication, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Greitzer, Frank L.; Kuchar, Olga Anna; Huston, Kristy – Journal on Educational Resources in Computing, 2007
Serious games use entertainment principles, creativity, and technology to meet government or corporate training objectives, but these principles alone will not guarantee that the intended learning will occur. To be effective, serious games must incorporate sound cognitive, learning, and pedagogical principles into their design and structure. In…
Descriptors: Training Objectives, Educational Technology, Educational Principles, Design Requirements
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Monfils, Barbara – 1993
As more people become computer literate, issues of privacy become more pertinent. Major privacy issues at the individual, national, and international levels are identified in the first part of the paper. These issues provide the basis for the second part of the paper, which is a report of a survey in which subjects were asked to indicate whether…
Descriptors: College Students, Computer Security, Confidential Records, Higher Education
Bedi, Param – Association of Small Computer Users in Education (ASCUE), 2005
This paper discusses how to implement networking solutions in residence halls at Arcadia University in Philadelphia. Sections of the paper include: (1) About Arcadia University; (2) Residence Halls Network; (3) How Campus Manager Helped Arcadia University; (4) What Is Campus Manager; (5) How Campus Manager Works; (6) Campus Manager Remediation…
Descriptors: Computer Networks, Private Colleges, Computer Uses in Education, Information Networks
Benson, Allen C. – 1998
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Descriptors: Computer Security, Computer Software, Computer System Design, Information Systems
Nair, Prakash – 2002
This document discusses integrating computers logically and affordably into a school building's infrastructure through the use of wireless technology. It begins by discussing why wireless networks using mobile computers are preferable to desktop machines in each classoom. It then explains the features of a wireless local area network (WLAN) and…
Descriptors: Computer Security, Computer Uses in Education, Costs, Educational Facilities Design
Peer reviewed Peer reviewed
Davida, George I. – Academe: Bulletin of the AAUP, 1981
The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)
Descriptors: Academic Freedom, Computer Security, Computers, Cryptography
Bailey, Gerald D. – Learning & Leading with Technology, 1997
School administrators consider themselves technology leaders, but few would claim they know all there is to know. This article examines 10 concepts for technology integration in 21st-century schools: change, technology planning, ethics, teaching and learning, safety and security, curriculum, staff development, infrastructure, technical support,…
Descriptors: Administrators, Change, Computer Security, Curriculum
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Pages: 1  |  ...  |  90  |  91  |  92  |  93  |  94  |  95  |  96  |  97  |  98  |  ...  |  109