NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,411 to 1,425 of 1,635 results Save | Export
Gordon, Barbara – Educom Review, 1996
Java is an object-oriented programming language developed by Sun Microsystems; its benefits include platform independence, security, and interactivity. Within the college community, Java is being used in programming courses, collaborative technology research projects, computer graphics instruction, and distance education. (AEF)
Descriptors: Computer Graphics, Computer Science Education, Computer Security, Computer Uses in Education
Peer reviewed Peer reviewed
Hersh, William R. – Journal of the American Society for Information Science, 1995
Describes the state of electronic medical records, their advantage over existing paper records, the problems impeding their implementation, and concerns over their security and confidentiality. Topics include challenges for the new health care era, including managed care systems, cost benefits, lack of standards, and future possibilities.…
Descriptors: Access to Information, Computer Security, Confidentiality, Cost Effectiveness
Peer reviewed Peer reviewed
Walker, Becki – CD-ROM Professional, 1995
Describes three companies' approaches to marketing and selling CD-ROM products on the World Wide Web. Benefits include low overhead for Internet-based sales, allowance for creativity, and ability to let customers preview products online. Discusses advertising, information delivery, content, information services, and security. (AEF)
Descriptors: Advertising, Comparative Analysis, Computer Networks, Computer Security
Sylvia, Margaret – Computers in Libraries, 1995
Addresses issues to consider when upgrading library CD-ROM networks for multimedia applications. Topics includes security issues; workstation requirements such as soundboards and monitors; local area network configurations that avoid bottlenecks: Asynchronous Transfer Mode, Ethernet, and Integrated Services Digital Network; server performance…
Descriptors: Computer Networks, Computer Security, Evaluation Criteria, Library Automation
College Planning & Management, 1999
Presents administrator's views on possible trends in college and universities. Addresses: hazardous waste disposal; privatization of custodial services; libraries and technology; building product purchases based on life-cycle cost; continuing education for employees; armed campus security; fees and tuition collection via online transactions; and…
Descriptors: Colleges, Computer Security, Hazardous Materials, Higher Education
Peer reviewed Peer reviewed
King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Peer reviewed Peer reviewed
Furnell, S. M.; Onions, P. D.; Bleimann, U.; Gojny, U.; Knahl, M.; Roder, H. F.; Sanders, P. W. – Internet Research, 1998
Presents a generic reference model for online distance learning and discusses security issues for each stage (enrollment, study, completion, termination, suspension). Discusses a security framework (authentication and accountability, access control, intrusion detection, network communications, nonrepudiation, learning resources provider…
Descriptors: Accountability, Alarm Systems, Computer Mediated Communication, Computer Security
Peer reviewed Peer reviewed
Orr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Technology & Learning, 2005
This article features the netTrekker d.i. The World Wide Web offers students the ability to do extensive searches for information. Properly used, it allows them to conduct the type of in-depth research that past generations could only dream of. Along with the opportunities are challenges. Danger lurks in the form of sites with misleading,…
Descriptors: Search Engines, Internet, Web Sites, Search Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Petersen, Rodney – EDUCAUSE Quarterly, 2004
The evolution of terms, such as computer security, network security, information security, and information assurance, appears to reflect a changing landscape, largely influenced by rapid developments in technology and the maturity of a relatively young profession and an emerging academic discipline. What lies behind the evolution of these terms?…
Descriptors: Educational Technology, Higher Education, Information Technology, Vocabulary Development
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Sean W. – EDUCAUSE Quarterly, 2004
At Dartmouth College, the author teaches a course called "Security and Privacy." Its early position in the overall computer science curriculum means the course needs to be introductory, and the author can't assume the students possess an extensive computer science background. These constraints leave the author with a challenge: to construct…
Descriptors: Homework, Assignments, Privacy, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Kafai, Yasmin B.; Nixon, Althea Scott; Burnam, Bruce – Journal of Technology and Teacher Education, 2007
With increased computer technology use in schools, preservice teachers must be prepared to deal with ethical issues involved in a range of computer uses, such as students plagiarizing from the Internet or accessing adults-only web sites. We investigated preservice teachers' judgments regarding several scenarios of student uses of the computer and…
Descriptors: Internet, Preservice Teachers, Ethics, Preservice Teacher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Enyeart, Mike; Staman, E. Michael; Valdes, Jose J., Jr. – EDUCAUSE Review, 2007
The concept of convergence has evolved significantly during recent years. Today, "convergence" refers to the integration of the communications and computing resources and services that seamlessly traverse multiple infrastructures and deliver content to multiple platforms or appliances. Convergence is real. Those in higher education, and especially…
Descriptors: Educational Opportunities, Higher Education, Educational Trends, Surveys
McQuade, Samuel C., III – Chronicle of Higher Education, 2007
A growing body of empirical research strongly suggests that adolescents and young adults are increasingly becoming both victims and perpetrators of crime and abuse enabled by information technology. The US federal government has stressed technological, legislative, and law-enforcement solutions to these problems. Efforts to protect children have…
Descriptors: Higher Education, Young Adults, Information Technology, Federal Government
Pages: 1  |  ...  |  91  |  92  |  93  |  94  |  95  |  96  |  97  |  98  |  99  |  ...  |  109