NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,261 to 1,275 of 1,629 results Save | Export
Trotter, Andrew – Education Week, 2004
This article discusses computer software that can give classrooms and computer labs the capabilities of costly PC's at a small fraction of the cost. A growing number of cost-conscious school districts are finding budget relief in low-cost computer software known as "open source" that can do everything from manage school Web sites to equip…
Descriptors: Computer Security, Computer Software, Cost Effectiveness, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Bahr, Ellen – Computers in Libraries, 2007
What would technological librarians like to see in the next generation of Integrated Library Systems (ILS)? This question was asked of several well- known library technology experts, and their responses are presented in this article. Survey respondents expressed a clear desire for the following features and functionality: (1) Direct, read-only…
Descriptors: Libraries, Internet, Library Automation, Computer Mediated Communication
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2008
As technology grows more pervasive in education, the data recovery issues that school systems encounter are becoming increasingly problematic, as districts work to accommodate a range of concerns that do not encumber commercial businesses. State and federal laws often require schools to report on student populations and educational progress…
Descriptors: Elementary Secondary Education, Educational Technology, Computer Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Bishop, Matt – Journal on Educational Resources in Computing, 2006
This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…
Descriptors: Political Science, Computer Security, Humanities, Context Effect
Peer reviewed Peer reviewed
Direct linkDirect link
Kabir, Md. H.; Shoja, Gholamali C.; Manning, Eric G. – Interactive Technology and Smart Education, 2006
Streaming audio/video contents over the Internet requires large network bandwidth and timely delivery of media data. A streaming session is generally long and also needs a large I/O bandwidth at the streaming server. A streaming server, however, has limited network and I/O bandwidth. For this reason, a streaming server alone cannot scale a…
Descriptors: Computer System Design, Intellectual Property, Internet, Simulation
Hogle, Jan G. – 1996
This document is a printed copy of the Web site written to educate Internet users about potential risks associated with communication over the Internet, and to suggest precautions to reduce those risks. An Introduction highlights why users should care about privacy on the Internet, activities that can reveal personal information to others, and…
Descriptors: Computer Mediated Communication, Computer Security, Discussion Groups, Electronic Mail
Shermis, Mark D.; Averitt, Jason – 2001
The purpose of this paper is to enumerate a series of security steps that might be taken by those researchers or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations here…
Descriptors: Computer Assisted Testing, Computer Security, Performance Based Assessment, Testing Problems
US Department of Homeland Security, 2005
Stop.Think.Connect. is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more secure online. The Campaign's main objective is to help individuals become more aware of growing cyber threats and arm them with the tools to protect themselves, their families,…
Descriptors: Public Schools, Computer Security, High Schools, Bullying
Office of the Press Secretary of the White House – Telecommunications, 1997
An abbreviated version of a longer policy document on electronic commerce released by the Clinton Administration, this article examines principles and recommendations on tariffs, taxes, electronic payment systems, uniform commercial code for electronic commerce, intellectual property protection, privacy, security, telecommunications infrastructure…
Descriptors: Computer Security, Information Technology, Intellectual Property, Internet
Educom Review, 1996
Presents the first part of an interview with Vinton Cerf, senior vice president of data architecture for MCI Engineering, on the growth and future of the Internet. Topics include: pornography; commercialization; security; government role; content found on the Internet; and convergence of technologies. (DGM)
Descriptors: Business, Computer Security, Futures (of Society), Government Role
Banerjee, Kyle – Computers in Libraries, 2003
Explains how to keep library systems healthy and functioning by taking sensible security measures. Examines why hackers would target library systems and how library systems are compromised. Describes tools that can help, including: firewalls; antivirus software; alarms; network analysis tools; and encryption. Identifies several strategies for…
Descriptors: Computer Networks, Computer Security, Libraries, Library Administration
Ferrer, Daniel Fidel; Mead, Mary – Computers in Libraries, 2003
Describes spyware, discusses how it gets on a computer. Explains how spyware can be useful for parents, employers, and libraries. Discusses how spyware is more often used for others' gain or for surveillance without notification, how it can go undetected, and how libraries can help keep computers and patrons protected from remote installation of…
Descriptors: Computer Networks, Computer Security, Computer Software, Libraries
Carnevale, Dan – Chronicle of Higher Education, 2003
Describes how campus administrators are scrambling to follow federal rules that force colleges to comply with a law, the Financial Services Modernization Act, requiring that personal data be protected from computer mishaps. (EV)
Descriptors: Compliance (Legal), Computer Security, Confidential Records, Federal Legislation
Pages: 1  |  ...  |  81  |  82  |  83  |  84  |  85  |  86  |  87  |  88  |  89  |  ...  |  109