NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,126 to 1,140 of 1,585 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Talab, Rosemary S.; Butler, Rebecca P. – TechTrends: Linking Research and Practice to Improve Learning, 2007
The concept of "publishing" has changed again, just in the last few years, due to YouTube, Blogger, Second Life, Flickr, and other new social networking tools (John Marshall Law School, 2005). Whether they are making it possible for everyone to view a video on YouTube on how to install a hard drive on a Mac, add a collaborative student writing…
Descriptors: Guidelines, Privacy, Copyrights, Internet
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Villano, Matt – Campus Technology, 2008
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Descriptors: Computer Uses in Education, Technological Advancement, Technology Uses in Education, Video Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Wagner, Paul J.; Phillips, Andrew T. – Journal on Educational Resources in Computing, 2006
We have developed a computer security workshop designed to instruct post-secondary instructors who want to start a course or laboratory exercise sequence in computer security. This workshop has also been used to provide computer security education to IT professionals and students. It is effective in communicating basic computer security principles…
Descriptors: Computer Security, Workshops, Information Technology, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Oblinger, Diana G.; Hawkins, Brian L. – EDUCAUSE Review, 2006
Seeing an institution's name in the headlines for a security breach may be among a CIO's-- and a president's--worst nightmares. Whether the breached data involves social security numbers, credit card accounts, clinical records, or research, this is bad news. Federal agencies that provide research funding may lose confidence in data integrity,…
Descriptors: Information Technology, Computer Security, Integrity, Risk Management
Semmelroth, Jim – Computers in Libraries, 2006
Asmall library's essential technical problem is that it has to chart a course through the technology shoals without a navigator on board. Small libraries in small towns often have a very low level of technical skill on staff. Furthermore, obtaining skilled technical support can frequently be pretty expensive. Even when one is available, a clever…
Descriptors: Public Libraries, Library Services, Computer Networks, Computer Security
Roberts, Gary – Computers in Libraries, 2006
An effective systems librarian must understand security vulnerabilities and be proactive in preventing problems. Specifics of future attacks or security challenges cannot possibly be anticipated, but this paper suggests some simple measures that can be taken to make attacks less likely to occur: program the operating system to get automatic…
Descriptors: Computer Security, Libraries, Librarians, Computer Networks
Saye, Lee – School Planning and Management, 1997
Schools can protect themselves against massive loss of computer data by taking action. Lists steps to plan a disaster recovery program, focus efforts to install it, and see that all bases are covered when it is in place. (MLF)
Descriptors: Computer Security, Elementary Secondary Education, Emergency Programs
Peer reviewed Peer reviewed
Bertino, Elisa; And Others – Information Systems, 1997
Presents a temporal access control model that provides for decentralized administration of authorizations. The model permits the specification of rules based on four temporal operators, to derive additional authorizations from the presence or absence of other authorizations. Also, the model provides flexibility and several protection requirements…
Descriptors: Access to Information, Computer Security, Decentralization, Models
Peer reviewed Peer reviewed
Doddrell, Gregory R. – Internet Research, 1996
As business relies less on "fortress" style central computers and more on distributed systems, the risk of disruption increases because of inadequate physical security, support services, and site monitoring. This article discusses information security and why protection is required on the Internet, presents a best practice firewall, and…
Descriptors: Business, Computer Security, Information Systems, Internet
Peer reviewed Peer reviewed
De Maeyer, Dirk – Internet Research, 1997
Examines the Internet's potential for becoming an information highway. Highlights include definitions of the information highway and the Internet; the infrastructure of an information highway; capacity; connectivity; simultaneity; network protocols; applications; interactivity; openness; mobility and remote access; universal access; affordable…
Descriptors: Access to Information, Computer Security, Internet, Privacy
Peer reviewed Peer reviewed
Oravec, Jo Ann – Business Education Forum, 2000
Risk management training cannot prevent hazards, but can help students learn to deal with them more efficiently. A risk-assessment and risk-communication approach to dealing with computer problems can be applied in the business classroom. (JOW)
Descriptors: Business Education, Computer Security, Risk Management, Training
Peer reviewed Peer reviewed
Lambert, Joyce C.; Lousteau, Carolyn L.; Mochetta, Page T. – T.H.E. Journal, 2001
Discusses the security of computerized test files based on a survey of collegiate educators and offers recommendations to make tests more secure. Highlights include passwords; firewalls; keeping test files offline rather than on a hard drive; encryption; and using software to write over files rather than just deleting them. (LRW)
Descriptors: Computer Security, Computer Software, Higher Education, Surveys
Goldsborough, Reid – Black Issues in Higher Education, 2004
Identity theft via bogus e-mail links, or "phishing," is escalating, with criminals becoming ever more brazen and sophisticated in their online schemes to trick people into revealing their personal information. People do get scammed. Phishing messages that appear to be sent by trusted companies dupe 3 percent of the people who receive…
Descriptors: Credit (Finance), Internet, Computer Security, Crime Prevention
Reynolds, Ben – Technology & Learning, 2005
"Sleazeware" is the authors' term for spyware, adware, malware, trackware, foistware, trojans, and other programs that sleaze into computers, either as a hidden component or by tricking someone into downloading them. Once in the machine, the program phones home for purposes ranging from simply reporting where people browse to downloading…
Descriptors: Information Retrieval, Internet, Privacy, Computer Security
Pages: 1  |  ...  |  72  |  73  |  74  |  75  |  76  |  77  |  78  |  79  |  80  |  ...  |  106