Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Boerner, Gerald L. – Syllabus, 2002
Discusses the use of wireless local area networks (WLANs) on college campuses. Highlights include traditional wired networks; cost, speed, and reliability; wireless networking standards; mobility; installation speed, simplicity, and flexibility; reduced cost of ownership; scalability; security issues; and a glossary of WLAN terms. (LRW)
Descriptors: Computer Security, Costs, Glossaries, Higher Education

Nackerud, Shane A. – Information Technology and Libraries, 1998
Describes CGI (Common Gateway Interface) scripts that are available on the Web and explains how librarians can use them to make Web pages more interactive. Topics include CGI security; Perl scripts; UNIX; and HTML. (LRW)
Descriptors: Computer Interfaces, Computer Security, Gateway Systems, Library Automation

Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models

Smith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Carlson, Scott – Chronicle of Higher Education, 2002
Discusses how colleges are creating offices to handle crimes, near-crimes, human errors, dramas, and assorted foibles on increasingly Internet-connected campuses. (EV)
Descriptors: College Students, Computer Security, Crime Prevention, Higher Education

Liao, Gen-Yih; Hwang, Jing-Jang – Internet Research, 2001
Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)
Descriptors: Business, Computer Oriented Programs, Computer Security, Consumer Economics
Friedman, Stan, Sr. – Library Journal, 2004
This article describes the results of the 19th annual Computers in Libraries Conference in Washington, DC on March 10-12, 2004. The conference peered into the future, drew lessons from the past, and ran like clockwork. Program chair Jane Dysart and her organizing committee are by now old hands, bringing together three keynote addresses, 100…
Descriptors: Information Technology, Internet, Privacy, Libraries
Stover, Del – Education Digest: Essential Readings Condensed for Quick Review, 2005
This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…
Descriptors: Behavior Problems, Computer Security, High School Students, Crime Prevention
Huwe, Terence – Computers in Libraries, 2005
In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…
Descriptors: Electronic Libraries, Publishing Industry, Information Technology, Crime Prevention

McLaughlin, Josetta; Pavelka, Deborah; McLaughlin, Gerald – Journal of Education for Business, 2005
A significant trend in higher education evolving from the wide accessibility to the Internet is the availability of an ever-increasing supply of data on Web sites for use by professors, students, and researchers. As this usage by a wider variety of users grows, the ability to judge the integrity of the data, the related findings, and the Web site…
Descriptors: Web Sites, Internet, Evaluation, Data
Norum, Pamela S.; Weagley, Robert O. – Journal of Educational Technology Systems, 2007
The Internet has experienced phenomenal growth in higher education. In addition to many pedagogical benefits, there are potential risks to the student users, including identity theft. This study examined the extent to which selected online practices that could minimize the risk of financial identity theft are used by college students. Data were…
Descriptors: College Students, Risk, Multivariate Analysis, Internet
Cole, David R. – E-Learning, 2007
E-learning on the Internet is constituted by the options that this global technology gives the user. This article explores these options in terms of the lifestyle choices and decisions that the learner will make about the virtual worlds, textual meanings and cultural groupings that they will find as they learn online. This is a non-linear process…
Descriptors: Electronic Learning, Terrorism, Internet, Educational Technology
Brustoloni, Jose Carlos – Journal on Educational Resources in Computing, 2006
We describe a sequence of five experiments on network security that cast students successively in the roles of computer user, programmer, and system administrator. Unlike experiments described in several previous papers, these experiments avoid placing students in the role of attacker. Each experiment starts with an in-class demonstration of an…
Descriptors: Confidentiality, Integrity, Internet, Laboratory Experiments
Starkman, Neal – T.H.E. Journal, 2007
Through conversations with students across different grade levels, there is clear evidence that two of the things they most desire contradict each other--and they use electronic technology to get both of them. This author had conversations with three groups of students in Seattle about their favorite electronic technologies, and any concerns they…
Descriptors: Privacy, High School Students, Computer Mediated Communication, Information Technology