NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,141 to 1,155 of 1,593 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
Breeding, Marshall – Computers in Libraries, 2005
Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…
Descriptors: Libraries, Internet, Computer Networks, Computer Security
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Villano, Matt – Campus Technology, 2008
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Descriptors: Computer Uses in Education, Technological Advancement, Technology Uses in Education, Video Technology
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Jokela, Paivi; Karlsudd, Peter – Journal of Information Technology Education, 2007
The current higher education, both distance education and traditional campus courses, relies more and more on modern information and communication technologies (ICT). The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment. In this work, we study the…
Descriptors: Higher Education, Plagiarism, Distance Education, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Talab, Rosemary S.; Butler, Rebecca P. – TechTrends: Linking Research and Practice to Improve Learning, 2007
The concept of "publishing" has changed again, just in the last few years, due to YouTube, Blogger, Second Life, Flickr, and other new social networking tools (John Marshall Law School, 2005). Whether they are making it possible for everyone to view a video on YouTube on how to install a hard drive on a Mac, add a collaborative student writing…
Descriptors: Guidelines, Privacy, Copyrights, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Wagner, Paul J.; Phillips, Andrew T. – Journal on Educational Resources in Computing, 2006
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
Descriptors: Computer Security, Workshops, Information Technology, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Oblinger, Diana G.; Hawkins, Brian L. – EDUCAUSE Review, 2006
Seeing an institution's name in the headlines for a security breach may be among a CIO's-- and a president's--worst nightmares. Whether the breached data involves social security numbers, credit card accounts, clinical records, or research, this is bad news. Federal agencies that provide research funding may lose confidence in data integrity,…
Descriptors: Information Technology, Computer Security, Integrity, Risk Management
Semmelroth, Jim – Computers in Libraries, 2006
Asmall library's essential technical problem is that it has to chart a course through the technology shoals without a navigator on board. Small libraries in small towns often have a very low level of technical skill on staff. Furthermore, obtaining skilled technical support can frequently be pretty expensive. Even when one is available, a clever…
Descriptors: Public Libraries, Library Services, Computer Networks, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Brooks, Rochelle – Contemporary Issues in Education Research, 2008
The ethical development of information systems is but one of those sensitive scenarios associated with computer technology that has a tremendous impact on individuals and social life. The significance of these issues of concern cannot be overstated. However, since computer ethics is meant to be everybody's responsibility, the result can often be…
Descriptors: Information Technology, Ethics, Social Responsibility, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Woollard, John; Wickens, Cathy; Powell, Ken; Russell, Terry – Technology, Pedagogy and Education, 2009
E-safety issues have come to the fore of thinking about young people's use of the internet because of their vulnerable position with regard to contact with people who may take advantage of them. The "Byron Review" in the UK makes explicit the steps that need to be taken to protect internet users. Based upon research across four United…
Descriptors: Safety, Foreign Countries, Internet, School Law
Gunter, Glenda A. – MultiMedia Schools, 1997
Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)
Descriptors: Computer Security, Computer Software, Downloading, Floppy Disks
Pages: 1  |  ...  |  73  |  74  |  75  |  76  |  77  |  78  |  79  |  80  |  81  |  ...  |  107