NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,486 to 1,500 of 1,585 results Save | Export
Petro, Jim – 1999
Survey data obtained in recent audits updated Ohio's local government units' assessment of Year 2000 (Y2K) readiness. The survey was developed with three intended objectives: (1) to provide an accurate assessment of the efforts to remediate the Y2K problem in Ohio's school districts, cities and counties; (2) to identify issues that could affect…
Descriptors: City Government, Computer Security, Counties, Elementary Secondary Education
New York State Office of the Comptroller, Albany. Div. of Management Audit. – 2000
This audit report of the State University of New York (SUNY) College of Agriculture and Technology at Morrisville addresses the question of whether the college management has established an effective system of internal control over its revenue, equipment, and student work-study payroll. The audit makes a number of observations and conclusions.…
Descriptors: Accountability, Administration, Computer Security, Educational Finance
Peer reviewed Peer reviewed
Direct linkDirect link
Blezard, Rob – Community College Journal, 2002
Discusses ways in which community colleges are lending their expertise and experience to help make the nation safer after the September 11th attacks. Reports that community colleges are instituting public safety and cybersecurity measures on their campuses and teaching others to do the same. Adds that community colleges are also training public…
Descriptors: College Role, Community Colleges, Computer Security, Crime
McCollum, Kelly – Chronicle of Higher Education, 1999
Colleges and universities are finding that ways to misbehave in computer-mediated communication come along faster than institutions can create policies to deal with them. Although most schools have acceptable-use policies, technological advances change the environment quickly and require flexible policies. Most institutions have created a mix of…
Descriptors: Administrative Policy, Computer Mediated Communication, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Vondracek, Mark – Staff and Educational Development International, 1999
Discusses the potential of technology in classrooms, along with the problems that occur with implementing curricular changes throughout an entire school. Addresses considerations such as staff development, parent acceptance and involvement, student vandalism and overall hardware and software security, and the inclusion of technology in…
Descriptors: Computer Assisted Instruction, Computer Security, Computer Uses in Education, Curriculum Development
Collet, Robert – Telecommunications, 1998
Argues that the Internet can continue its explosive growth only if it is carefully, constantly, and thoughtfully administered. Discusses the role of ISPs (Internet Service Providers); the need to respond to the market force; making the transition from the federal to the commercial level; funding; the domain name server; security; and challenges to…
Descriptors: Computer Security, Financial Support, Futures (of Society), Government (Administrative Body)
Peer reviewed Peer reviewed
Smith, Bruce; Fraser, Bruce T.; McClure, Charles R. – Journal of Academic Librarianship, 2000
Considers selected policy instruments related to federal agencies' deployment of information in a Web environment in terms of five key policy areas: access, security, privacy, intellectual property, and records management. Suggests that there are a significant number of policy instruments affecting federal Web site development. Identifies the need…
Descriptors: Access to Information, Computer Security, Document Delivery, Government Publications
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development
Peer reviewed Peer reviewed
Rovai, Alfred P. – Internet and Higher Education, 2000
Identifies the major principles of general assessment theory, examines how these principles can be applied to online environments for distance education, and describes assessment issues that have special significance in virtual classrooms. Discusses proctored testing, identity security, academic honesty, and use of online discussions for…
Descriptors: Cheating, Computer Security, Constructivism (Learning), Discussion (Teaching Technique)
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This September 24, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Thank You, Masked Man" (Reilly, Liam); (2) "The Trailing-Spouse…
Descriptors: Higher Education, Biological Sciences, Scholarship, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cunningham, Alisa F.; Milam, John – National Center for Education Statistics, 2005
This report examines the feasibility of implementing a student unit record system to replace the student-related components that currently are based on aggregate institution-level data collected as part of the Integrated Postsecondary Education Data System (IPEDS). The feasibility study was initiated by the National Center for Education Statistics…
Descriptors: Feasibility Studies, Student Records, Evaluation Methods, Technology Integration
Anderson, Laura Challman; Lotspiech, Jeffrey B. – Bulletin of the American Society for Information Science, 1995
Discusses collaborative efforts by the Institute for Scientific Information (ISI) and the IBM Digital Library Group in creating techniques to ensure information integrity, journal article authenticity, user confidentiality, management of copyright, and general security in electronic libraries. Also describes the rights management and security…
Descriptors: Access to Information, Computer Security, Computer System Design, Confidentiality
Peer reviewed Peer reviewed
Duggan, Brian – TechTrends, 1994
Explores design considerations for a functional microcomputer lab, including ergonomics and furnishings; access for the disabled; the use of other media; hardware security; and software security, including virus protection. A summary paragraph comments on the role of planning and forecasting. A bibliography of eight titles for further reading is…
Descriptors: Accessibility (for Disabled), Audio Equipment, Computer Centers, Computer Security
Pages: 1  |  ...  |  96  |  97  |  98  |  99  |  100  |  101  |  102  |  103  |  104  |  105  |  106