NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 961 to 975 of 1,589 results Save | Export
Messner, Kate – School Library Journal, 2009
As the ranks of educators on Twitter grow, more and more are heard about the importance of their "PLNs" (a term reportedly coined by educational technology guru David Warlick). A PLN, or Personal Learning Network, is a group of like-minded professionals with whom one can exchange ideas, advice, and resources. So why shouldn't students have PLNs of…
Descriptors: Educational Change, Educational Technology, Social Networks, Computer Security
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Shaw, R. S.; Chen, Charlie C.; Harris, Albert L.; Huang, Hui-Jou – Computers & Education, 2009
In recent years, rapid progress in the use of the internet has resulted in huge losses in many organizations due to lax security. As a result, information security awareness is becoming an important issue to anyone using the Internet. To reduce losses, organizations have made information security awareness a top priority. The three main barriers…
Descriptors: Online Courses, Multimedia Materials, Computer Security, Educational Technology
National Council on Measurement in Education, 2012
Testing and data integrity on statewide assessments is defined as the establishment of a comprehensive set of policies and procedures for: (1) the proper preparation of students; (2) the management and administration of the test(s) that will lead to accurate and appropriate reporting of assessment results; and (3) maintaining the security of…
Descriptors: State Programs, Integrity, Testing, Test Preparation
Peer reviewed Peer reviewed
Direct linkDirect link
Harris, Albert L.; Lang, Michael; Yates, Dave; Kruck, S. E. – Journal of Information Systems Education, 2011
This paper discusses the importance of ethics and social responsibility in information systems (IS) education. The many public scandals of corporate misconduct have increased the need for more emphasis to be placed on ethics and ethical issues in IS education. The authors describe how the inclusion of ethics and social responsibility in the IS…
Descriptors: Freedom of Speech, Intellectual Property, Information Systems, Social Responsibility
Peer reviewed Peer reviewed
Direct linkDirect link
Battisti, F.; Boato, G.; Carli, M.; Neri, A. – IEEE Transactions on Education, 2011
Low-cost personal computers, wireless access technologies, the Internet, and computer-equipped classrooms allow the design of novel and complementary methodologies for teaching digital information security in electrical engineering curricula. The challenges of the current digital information era require experts who are effectively able to…
Descriptors: Foreign Countries, Computers, Computer Networks, Telecommunications
Peer reviewed Peer reviewed
Direct linkDirect link
Hartnett, Stephen John – Quarterly Journal of Speech, 2011
The "twisted cyber spy" affair began in 2010, when Google was attacked by Chinese cyber-warriors charged with stealing Google's intellectual property, planting viruses in its computers, and hacking the accounts of Chinese human rights activists. In the ensuing international embroglio, the US mainstream press, corporate leaders, and White…
Descriptors: Civil Rights, Rhetoric, Intellectual Property, Global Approach
Vance, Erik – Chronicle of Higher Education, 2007
In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so…
Descriptors: Foreign Countries, Computer Security, Courses
Zhou, Yicong – ProQuest LLC, 2010
This dissertation introduces a new multimedia security system for the performance of object recognition and multimedia encryption in security and medical applications. The system embeds an enhancement and multimedia encryption process into the traditional recognition system in order to improve the efficiency and accuracy of object detection and…
Descriptors: National Security, Cancer, Multimedia Materials, Computer Security
Reiss, Jeffrey – ProQuest LLC, 2010
Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution's resources combined with the typical college student's lack of funds makes it more lucrative. Students…
Descriptors: Copyrights, Computer Software, Corporations, Ethics
Flinn, Michael Bradley – ProQuest LLC, 2009
With privacy concerns growing on a daily basis, it is important to understand how college students guard their personally identifiable information. Despite the students' perceived readiness and several studies on the topic, it is not fully understood what personally identifiable information college students are sharing via online social networks…
Descriptors: College Students, Internet, Social Networks, Grade Point Average
Peer reviewed Peer reviewed
Direct linkDirect link
Voss, Brian D.; Siegel, Peter M. – EDUCAUSE Review, 2009
Considering the unprecedented budget hardships in higher education, now may not seem to be an auspicious time to be emphasizing the importance of continuing, or even perhaps increasing, investments in information security. Decisions regarding these matters are usually in the hands of the CIOs, leaving information technology (IT) leaders in…
Descriptors: Higher Education, Economic Climate, Information Systems, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2009
Since laptop programs extend instruction beyond the campus, it is then a must for schools to try a variety of solutions to protect their machines--and their users. Combining high-tech safeguards with face-to-face user education is a must for schools whose laptop programs allow students to take the computers off-site. For a cautionary tale on the…
Descriptors: Educational Technology, Laptop Computers, Access to Computers, Computer Security
Kaye, Alan L. – Library Journal, 2008
Take a look around the bus or subway and see just how many people are bumping along to an iPod or an MP3 player. What they are listening to is their secret, but the many signature earbuds in sight should give one a real sense of just how pervasive digital audio has become. This article describes how that popularity is mirrored in library audio…
Descriptors: Library Services, Audio Equipment, Library Materials, Public Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Milentijevic, Ivan; Ciric, Vladimir; Vojinovic, Oliver – Computers & Education, 2008
This paper deals with the development of a generalized model for version control systems application as a support in a range of project-based learning methods. The model is given as UML sequence diagram and described in detail. The proposed model encompasses a wide range of different project-based learning approaches by assigning a supervisory…
Descriptors: Student Projects, Cooperation, Active Learning, Models
Pages: 1  |  ...  |  61  |  62  |  63  |  64  |  65  |  66  |  67  |  68  |  69  |  ...  |  106