NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,396 to 1,410 of 1,589 results Save | Export
Sylvia, Margaret – Computers in Libraries, 1995
Addresses issues to consider when upgrading library CD-ROM networks for multimedia applications. Topics includes security issues; workstation requirements such as soundboards and monitors; local area network configurations that avoid bottlenecks: Asynchronous Transfer Mode, Ethernet, and Integrated Services Digital Network; server performance…
Descriptors: Computer Networks, Computer Security, Evaluation Criteria, Library Automation
College Planning & Management, 1999
Presents administrator's views on possible trends in college and universities. Addresses: hazardous waste disposal; privatization of custodial services; libraries and technology; building product purchases based on life-cycle cost; continuing education for employees; armed campus security; fees and tuition collection via online transactions; and…
Descriptors: Colleges, Computer Security, Hazardous Materials, Higher Education
Peer reviewed Peer reviewed
King, Monica – Public Libraries, 1999
Describes one public library's development of a computer-security plan, along with helpful products used. Discussion includes Internet policy, physical protection of hardware, basic protection of the operating system and software on the network, browser dilemmas and maintenance, creating clear intuitive interface, and administering fair use and…
Descriptors: Computer Security, Computer Software, Information Policy, Information Technology
Peer reviewed Peer reviewed
Furnell, S. M.; Onions, P. D.; Bleimann, U.; Gojny, U.; Knahl, M.; Roder, H. F.; Sanders, P. W. – Internet Research, 1998
Presents a generic reference model for online distance learning and discusses security issues for each stage (enrollment, study, completion, termination, suspension). Discusses a security framework (authentication and accountability, access control, intrusion detection, network communications, nonrepudiation, learning resources provider…
Descriptors: Accountability, Alarm Systems, Computer Mediated Communication, Computer Security
Peer reviewed Peer reviewed
Orr, Giles – Library Software Review, 1998
Presents a method for libraries with limited budgets to create reliable Web servers with existing hardware and free software available via the Internet. Discusses staff, hardware and software requirements, and security; outlines the assembly process. (PEN)
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Information Networks
Technology & Learning, 2005
This article features the netTrekker d.i. The World Wide Web offers students the ability to do extensive searches for information. Properly used, it allows them to conduct the type of in-depth research that past generations could only dream of. Along with the opportunities are challenges. Danger lurks in the form of sites with misleading,…
Descriptors: Search Engines, Internet, Web Sites, Search Strategies
Peer reviewed Peer reviewed
Direct linkDirect link
Petersen, Rodney – EDUCAUSE Quarterly, 2004
The evolution of terms, such as computer security, network security, information security, and information assurance, appears to reflect a changing landscape, largely influenced by rapid developments in technology and the maturity of a relatively young profession and an emerging academic discipline. What lies behind the evolution of these terms?…
Descriptors: Educational Technology, Higher Education, Information Technology, Vocabulary Development
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Sean W. – EDUCAUSE Quarterly, 2004
At Dartmouth College, the author teaches a course called "Security and Privacy." Its early position in the overall computer science curriculum means the course needs to be introductory, and the author can't assume the students possess an extensive computer science background. These constraints leave the author with a challenge: to construct…
Descriptors: Homework, Assignments, Privacy, Computer Security
Consortium for School Networking (NJ1), 2006
When there is the unexpected disaster of any kind, school personnel, students, parents and communities expect to rely on communication and critical services such as payroll and access to student information the district provides and therefore the technology that supports them. Disaster recovery of IT-related operations and information is critical…
Descriptors: Emergency Programs, Crisis Management, Natural Disasters, Leadership Responsibility
Peer reviewed Peer reviewed
Direct linkDirect link
Lawhon, Tommie; Ennis-Cole, Demetria; Lawhon, David C. – Community College Journal of Research & Practice, 2006
Practical information on the necessity for community colleges, instructors, and students to understand and abide by the copyright laws is essential. Whether developing, structuring, maintaining, or presenting courses, or instructing students on the development of their own papers, one must be knowledgeable about plagiarism, the Fair Use Act, and…
Descriptors: Copyrights, Plagiarism, Distance Education, Community Colleges
Barrett, Joanne – Learning & Leading with Technology, 2006
Social networking is one of the latest trends to evolve out of the growing online community. Social networking sites gather data submitted by members that is then stored as user profiles. The data or profiles can then be shared among the members of the site. Membership can be free or fee-based. A typical social networking site provides members…
Descriptors: Elementary Secondary Education, Profiles, Social Networks, Web Sites
Kim, Ann – Library Journal, 2006
This article discusses the possible answers to most librarians' questions and how advanced and hi-technology help them in the library world. Many of the answers to librarians' questions regarding digital media depend upon community/patron awareness and library resources. In this article, the author presents some quoted statements from electronic…
Descriptors: Librarians, Library Services, Library Development, Information Retrieval
General Accounting Office, Washington, DC. – 1995
This report focuses on the pivotal technical issues associated with the National Information Infrastructure program, security and privacy, interoperability, and reliability, and presents the General Accounting Office's findings on these challenges. It is reported that while the structures and services to be offered by the information superhighway…
Descriptors: Communications, Computer Networks, Computer Security, Confidentiality
Khosrowpour, Mehdi; Amoroso, Donald – 1991
With the realization that microcomputers provide an extraordinary value to the organization follows the need to address a variety of issues in order to more effectively manage these resources. Each of the 14 chapters, consisting of papers written by different authors, represents a different perspective existing in organizations with respect to the…
Descriptors: Administration, Artificial Intelligence, Computer Science Education, Computer Security
National Association of State Universities and Land-Grant Colleges, 2004
This document represents the higher education and library community's guiding public policy agenda on information technology (IT) for the current year. The Higher Education Information Technology (HEIT) Alliance is a coalition of 11 national higher education and library associations, whose members represent a broad array of stakeholders on college…
Descriptors: Telecommunications, Library Associations, Information Technology, Intellectual Property
Pages: 1  |  ...  |  90  |  91  |  92  |  93  |  94  |  95  |  96  |  97  |  98  |  ...  |  106