NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,336 to 1,350 of 1,589 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken – EDUCAUSE Quarterly, 2004
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Descriptors: Internet, Computer Security, Computer Networks, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – Discourse: Studies in the Cultural Politics of Education, 2007
Whilst the association of risk with schools is predominately a negative one, fostering images of potential dangers, this paper draws upon a socio-cultural counter-discourse to explore the perceived benefits of certain risk taking activities within educational establishments. Using research data on school Internet "misuse" it is argued…
Descriptors: Student Attitudes, Internet, Risk, Student Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2007
According to a January 2007 survey by the Pew Internet & American Life Project, 55 percent of teens (ages 12 to 17) report having created a personal profile online, and an equal number regularly use social networking sites such as MySpace or Facebook. Of those, 91 percent use the sites to stay in touch with friends they see frequently. With all…
Descriptors: Internet, Social Networks, Adolescents, Student Motivation
Martin, James; Samels, James E. – Chronicle of Higher Education, 2007
College and university presidents are increasingly called upon to make informed choices about technology. The rapidly shifting landscape makes it tough to keep up with change and innovation, let alone stay ahead of the curve. In this article, the authors discuss 10 trends to watch in campus technology. These trends are the following: (1) increased…
Descriptors: Educational Trends, Information Technology, Partnerships in Education, Proprietary Schools
American Association of Community Colleges, 2006
Although homeland security has gained prominence as a national focus and investment, it is clear that much of the most effective preparation must begin at local, state, and regional levels. This report reveals that an astonishing number of community colleges offer degree and certificate programs for first responders--law enforcement officers,…
Descriptors: National Security, Community Colleges, Partnerships in Education, Crisis Management
Peer reviewed Peer reviewed
Direct linkDirect link
Kleinwachter, Wolfgang – E-Learning, 2006
This article addresses issues central to the task of Internet governance and, especially, to the management of the Internet's core resources. Early conceptions of the Internet as a virtual space that required no regulation resisted initial governance activity. More recently, work by people like Lawrence Lessig has clarified the complex…
Descriptors: Internet, Public Policy, Governance, Misconceptions
Peer reviewed Peer reviewed
Direct linkDirect link
International Journal of Testing, 2006
Developed by the International Test Commission, the International Guidelines on Computer-Based and Internet-Delivered Testing are a set of guidelines specifically developed to highlight good practice issues in relation to computer/Internet tests and testing. These guidelines have been developed from an international perspective and are directed at…
Descriptors: Guidelines, Computer Assisted Testing, Internet, Test Construction
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software
Hare, Karen – ProQuest LLC, 2008
Implementation of information systems has lagged in many areas of clinical healthcare for a variety of reasons. Economics, data complexity and resistance are among the often quoted roadblocks. Research suggests that physicians play a major part in the adoption, use and diffusion of information technology (IT) in clinical settings. There are also…
Descriptors: Information Needs, Physicians, Information Systems, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Campbell, John P.; Oblinger, Diana G. – EDUCAUSE Quarterly, 2007
The EDUCAUSE Advisory Committee for Teaching and Learning (ACTL) has identified the key technology-related teaching and learning issues in higher education for 2007. The 10 important teaching and learning issues are: (1) Establishing and supporting a culture of evidence; (2) Demonstrating improvement of learning; (3) Translating learning…
Descriptors: College Instruction, Validity, Educational Improvement, Theory Practice Relationship
Peer reviewed Peer reviewed
Direct linkDirect link
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Review, 2007
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2006 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Computer Software, Telecommunications, Computer Networks, Computer Uses in Education
Telecommunications Policy Research Conference, Inc., Washington, DC. – 1987
In his paper, "European Needs and Attitudes towards Information Security," Richard I. Polis notes that the needs for security in computer systems, telecommunications, and media are rather uniform throughout Western Europe, and are seen as being significantly different from the needs in the United States. Recognition of these needs is,…
Descriptors: Access to Information, Banking, Computer Security, Cryptography
Harrison, J. Phil – Business Officer, 1996
A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…
Descriptors: Alarm Systems, College Administration, Computer Security, Computers
Neray, Phil – Online Libraries and Microcomputers, 1997
Discusses Internet access and monitoring in light of H. G. Wells' idea of a world brain or encyclopedia, or mind of the species. Topics include the evolution and effects of Internet access, including employee productivity, network bandwidth, and legal liabilities or negative publicity; and Internet usage and security policy. (LRW)
Descriptors: Access to Computers, Access to Information, Computer Security, Internet
Pages: 1  |  ...  |  86  |  87  |  88  |  89  |  90  |  91  |  92  |  93  |  94  |  ...  |  106