NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,216 to 1,230 of 1,589 results Save | Export
Peer reviewed Peer reviewed
Samoriski, Jan H.; And Others – Journal of Broadcasting & Electronic Media, 1996
Attempts to clarify the status of e-mail privacy under the Electronic Communications Privacy Act of 1986 (ECPA). Examines current law and the paucity of definitive case law. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e-mail,…
Descriptors: Computer Security, Electronic Mail, Information Policy, Laws
Fleischman, John – Converge, 2002
Discusses wireless local area networks (LANs) which typically consist of laptop computers that connect to fixed access points via infrared or radio signals. Topics include wide area networks; personal area networks; problems, including limitations of available bandwidth, interference, and security concerns; use in education; interoperability;…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer Security, Cost Effectiveness
Mills, Lane B. – School Administrator, 2005
Lane Mills, assistant superintendent for accountability and technology for Wilson County Schools, in North Carolina, describes the process of reviewing and updating technology policies in her home school district. While technology policies and procedures should be tailored to each district's needs and level of technology use, some basic policies…
Descriptors: Educational Technology, School Districts, Web Sites, Educational Policy
Peer reviewed Peer reviewed
Sousa, Kenneth J.; MacDonald, Laurie E.; Fougere, Kenneth T. – Journal of Education for Business, 2005
The authors conducted an evaluation of Management Information Systems (MIS) textbooks and found that computer security receives very little in-depth coverage. The textbooks provide, at best, superficial treatment of security issues. The research results suggest that MIS faculty need to provide material to supplement the textbook to provide…
Descriptors: Textbooks, Management Information Systems, Computer Security, Textbook Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Cerf, Vinton G. – EDUCAUSE Review, 2004
In t his article, the author discusses the role of higher education research and development (R&D)--particularly R&D into the issues and problems that industry is less able to explore. In addition to high-speed computer communication, broadband networking efforts, and the use of fiber, a rich service environment is equally important and is…
Descriptors: Internet, Higher Education, Research and Development, Telecommunications
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Villano, Matt – Campus Technology, 2007
Nowadays, college and university auxiliary services departments are turning to text messaging types of technologies to move a host of programs and offerings into the mobile environment. A July 2007 study by Youth Trends indicated that 95 percent of college freshmen come to school with a cell phone or other handheld device, and 78 percent of them…
Descriptors: Higher Education, College Students, Communication Strategies, College Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Richards, Griff; Donkers, Peter; Hatala, Marek; Dufresne, Aude – Interactive Learning Environments, 2007
Campus Canada promotes lifelong learning through the articulation of workplace and other experiential learning for academic credit. This paper describes the recent re-development of the Record of Learning (RoL) component of the Campus Canada's e-Portfolio System. In matching the academic members' desires for provision of secure e-transcripts with…
Descriptors: Foreign Countries, Validity, Competence, Experiential Learning
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2006
What would people do without the Internet? It gives them the world at their fingertips. Almost anything that they want and need can be found in one neat little place. The Internet is a great place for kids also. They can be entertained, chat with friends, and learn about whatever interests them. Unfortunately the Internet also helps people…
Descriptors: Internet, Computer Security, Child Safety, Computer Mediated Communication
WCET, 2008
Much attention has been focused on the accountability, student learning outcomes, transfer of credit, and illegal file sharing provisions of the two related bills that have moved through the U.S. Senate and the House of Representatives to amend and extend the provisions of the 1965 Higher Education Act (S. 1642 and H.R. 4137). One of the…
Descriptors: Higher Education, Educational Technology, Distance Education, Integrity
Peer reviewed Peer reviewed
Direct linkDirect link
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment
Gosmire, Doreen; Grady, Marilyn L. – Principal Leadership, 2007
Technology expenditures and usage in schools have risen by nearly 300 percent during the last three decades. Few principals claim to be technology experts, but most aspire to design a map that leads their schools to success with educational technology. The key to success on the journey is not to know everything, but to ask the right questions.…
Descriptors: Principals, Educational Technology, Technology Integration, Educational Trends
Peer reviewed Peer reviewed
Direct linkDirect link
Tynes, Brendesha M. – Journal of Adolescent Research, 2007
Many Internet safety and parenting experts suggest that parents prohibit their teens from social networking sites and other online spaces where predators may lurk. But we may do adolescents a disservice when we curtail their participation in these spaces, because the educational and psychosocial benefits of this type of communication can far…
Descriptors: Safety, Internet, Adolescents, Social Networks
Pages: 1  |  ...  |  78  |  79  |  80  |  81  |  82  |  83  |  84  |  85  |  86  |  ...  |  106