NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,291 to 1,305 of 1,585 results Save | Export
Peer reviewed Peer reviewed
Bruhn, Mark; Gettes, Michael; West, Ann – Educause Quarterly, 2003
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Elementary Secondary Education
Peer reviewed Peer reviewed
Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design
Peer reviewed Peer reviewed
Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Mhlaba, Sondlo Leonard – Government Information Quarterly, 1995
Discusses origins of Transborder Data Flows (TDFs) as an international problem in the early 1970s. Shows how technological development in telecommunications and networks has made regulation more complex and urgent. Recommends the internationalization of the Key Escrowed Encryption System (KEES) and the development of broad international TDF…
Descriptors: Coding, Computer Security, Copyrights, Information Transfer
Peer reviewed Peer reviewed
Panepinto, Joe – Telematics and Informatics, 1995
Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)
Descriptors: Computer Security, Confidential Records, Electronic Mail, Federal Legislation
Peer reviewed Peer reviewed
Radack, Shirley M. – Government Information Quarterly, 1994
Examines the role of the National Institute of Standards and Technology (NIST) in the development of the National Information Infrastructure (NII). Highlights include the standards process; voluntary standards; Open Systems Interconnection problems; Internet Protocol Suite; consortia; government's role; and network security. (16 references) (LRW)
Descriptors: Computer Networks, Computer Security, Consortia, Federal Government
Zirkel, Perry A. – Phi Delta Kappan, 1999
Discusses a complicated appellate-court case upholding a Milwaukee high-school junior's expulsion for advocating computer hacking in a student newspaper. The decision is noteworthy for signaling a growing technology-related litigation trend, conflating the advocacy/incitement issue, and showing courts' decreasing tolerance for perceived threats to…
Descriptors: Censorship, Computer Security, Court Litigation, Expulsion
Zirkel, Perry A. – Phi Delta Kappan, 1998
A complex case involving a disgruntled ex-employee's invasion of a college president's e-mail system resulted in a decision granting two plaintiffs' motions for summary judgment. This was the first recorded education-related collision on the electronic superhighway. Every educational institution should have a policy and procedure regarding what…
Descriptors: Computer Security, Dismissal (Personnel), Due Process, Electronic Mail
Peer reviewed Peer reviewed
Aldridge, Alicia; Forcht, Karen; Pierson, Joan – Internet Research, 1997
To cultivate an online market share, companies must design marketing strategies specifically for the Internet. This article examines the nature of business on the Internet, highlighting demographics, user control, accessibility, communication, authenticity, competition, and security and proposes a marketing strategy, including targeting and…
Descriptors: Access to Information, Advertising, Business, Competition
Peer reviewed Peer reviewed
School Libraries in Canada, 2000
Presents a teaching unit from the Media Awareness Network Web site that introduces students (grades six through nine) to ways in which commercial Web sites collect personal information from children and issues surrounding children and privacy on the Internet. Highlights: objective; learning outcomes; preparation and materials; the lesson; guided…
Descriptors: Child Safety, Children, Class Activities, Computer Security
McCollum, Kelly – Chronicle of Higher Education, 2000
Describes university courses and programs in protecting computer networks and World Wide Web sites from vandals, cyberterrorists, and malicious hackers. Notes such courses are provided by East Stroudsburg University (Pennsylvania), Purdue University (Indiana), George Mason University (Virginia), and Texas A&M University. Also notes the federal…
Descriptors: College Curriculum, Computer Networks, Computer Security, Government School Relationship
Peer reviewed Peer reviewed
Foster, Janet – Public Libraries, 1999
Presents information for public libraries on computer-related vulnerabilities as the century turns from 1999 to 2000. Highlights include: general Y2K information; the Y2K Bug and PCs; Y2K sites for librarians; Online Computer Library Center (OCLC) and USMARC; technological developments in cyberspace; and a list of Web sites and Y2K resources. (AEF)
Descriptors: Computer Oriented Programs, Computer Security, Computer System Design, Information Sources
Breeding, Marshall – Computers in Libraries, 2005
Who can be trusted on the Web? These days, with identity theft seemingly rampant, it's more important than ever to take all possible measures to protect privacy and to shield personal information from those who might not have good intentions. Today, librarians also have to take reasonable precautions to ensure that the online services that they…
Descriptors: Web Sites, Librarians, Trust (Psychology), Internet
Wiley, Wayne C. – Technology & Learning, 2004
Managing district information, web sites, and data security as well as supplying information on-demand are just a few of the tasks causing educational administrators to seek new solutions these days. The answer is to streamline the business of running schools by putting all information in one place so coordinated data and files can be accessed.…
Descriptors: Information Management, Databases, Database Management Systems, Computer Software
Peer reviewed Peer reviewed
Ribble, Mike S.; Bailey, Gerald D. – T.H.E. Journal, 2004
Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is beginning to emerge in society. This outbreak of technology misuse and abuse is documented in continual news coverage on TV, in newspapers and on the Internet--both inside and outside of schools. The endless list of misuse and…
Descriptors: Computer Security, Crime, Technology Education, Citizenship
Pages: 1  |  ...  |  83  |  84  |  85  |  86  |  87  |  88  |  89  |  90  |  91  |  ...  |  106