NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,126 to 1,140 of 1,629 results Save | Export
Svetcov, Eric – Technology & Learning, 2004
When it comes to security, many people do not know what they do not know. Consider for example, an administrator who leaves her password taped under her keyboard, or a teacher who doesn't change his password (ever!) or can't be bothered to log out or lock the computer, all the firewalls and antivirus programs in the world will not protect a…
Descriptors: Educational Technology, Computer Security, Professional Training
Peer reviewed Peer reviewed
Lozano-Hemmer, Rafael; Gomez-Pena, Guillermo – Aztlan: A Journal of Chicano Studies, 2004
The leaked documents of the tech-illa network are investigated. It was unclear that if the information was left in the cracked server on purpose, to be distributed by the hackers as a decoy.
Descriptors: Internet, Computer Networks, Computer Security, Crime
Cheng, Kirby – Computers in Libraries, 2005
When I first realized I'd been hacked, I thought, 'Oh, my God, they really did it!" While trying to recover from the shock, I had to call the supervisors of the departments with services affected by the loss of the library's server. In a seemingly calm voice, I told them one by one, "Sorry to let you know, our server is down; it has been hacked…
Descriptors: Internet, Libraries, Computer Security, Library Services
Villano, Matt – Technology & Learning, 2005
In this article, the author presents the latest wireless equipments available in market. For starters, wireless networks offer mobility and flexibility: users of laptops, PDAs, tablet PCs, and wireless Voice over IP telephones can move freely about campus while staying connected to the Internet. There are two kinds of wireless networks: ad-hoc, or…
Descriptors: Telecommunications, Computer Networks, Internet, Computer Security
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, David S.; Wang, Tao – College Teaching Methods & Styles Journal, 2008
Two computer viruses that have caused hundreds of millions of dollars in damage over the past four years are the Melissa and the Sasser virus. In March of 1999, the Melissa virus first appeared on the Internet and spread rapidly throughout computer systems in the United States and Europe. The virus made its way through 1.2 million computers in the…
Descriptors: Computer Security, Internet, Ethics, Computer Uses in Education
Sharma, Priya; Xie, Ying – Journal of Asynchronous Learning Networks, 2008
Recently, attempts have been made to use Weblogs and other personal webpublishing technologies to support individual and social reflection in higher education. Weblogs can be highly individual and reflective in nature, and students' experiences and perceptions of the technology and practice are of primary importance in furthering educational use.…
Descriptors: Student Attitudes, Data Analysis, Electronic Publishing, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Debra H.; DeBlois, Peter B. – EDUCAUSE Review, 2008
EDUCAUSE presents the top-ten IT-related issues in terms of strategic importance to the higher education institution, as revealed by the ninth annual EDUCAUSE Current Issues Survey. This year, "Security" moves back to the top of the list. (Contains 20 notes.)
Descriptors: Higher Education, Educational Technology, Computer Uses in Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
Just as many people log onto a Web mail site (Gmail, Yahoo, MSN, etc.) to read, write and store their email, there are Web sites out there with word processing, database, and a myriad of other software applications that are not downloadable but used on the site through a Web browser. The user does not have to download the applications to a…
Descriptors: Computer Software, Internet, Online Searching, Web Sites
Schneider, Karen G. – Library Journal, 2007
Over the next several decades, libraries will face the potential loss of all the e-journals, ebooks, electronic theses, local digital collections, and other "e-stuff" curated for the public good. A solution to this problem is LOCKSS ("Lots of Copies Keep Stuff Safe"), a free, open-source digital-preservation software from Stanford University that…
Descriptors: Computer Software, Libraries, Library Networks, Library Services
Saye, Lee – School Planning and Management, 1997
Schools can protect themselves against massive loss of computer data by taking action. Lists steps to plan a disaster recovery program, focus efforts to install it, and see that all bases are covered when it is in place. (MLF)
Descriptors: Computer Security, Elementary Secondary Education, Emergency Programs
Peer reviewed Peer reviewed
Bertino, Elisa; And Others – Information Systems, 1997
Presents a temporal access control model that provides for decentralized administration of authorizations. The model permits the specification of rules based on four temporal operators, to derive additional authorizations from the presence or absence of other authorizations. Also, the model provides flexibility and several protection requirements…
Descriptors: Access to Information, Computer Security, Decentralization, Models
Peer reviewed Peer reviewed
Doddrell, Gregory R. – Internet Research, 1996
As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…
Descriptors: Business, Computer Security, Information Systems, Internet
Peer reviewed Peer reviewed
De Maeyer, Dirk – Internet Research, 1997
Examines the Internet's potential for becoming an information highway. Highlights include definitions of the information highway and the Internet; the infrastructure of an information highway; capacity; connectivity; simultaneity; network protocols; applications; interactivity; openness; mobility and remote access; universal access; affordable…
Descriptors: Access to Information, Computer Security, Internet, Privacy
Pages: 1  |  ...  |  72  |  73  |  74  |  75  |  76  |  77  |  78  |  79  |  80  |  ...  |  109