Publication Date
In 2025 | 23 |
Since 2024 | 160 |
Since 2021 (last 5 years) | 420 |
Since 2016 (last 10 years) | 644 |
Since 2006 (last 20 years) | 1222 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives
Machovec, George S. – Online Libraries and Microcomputers, 1997
Provides an overview of the electronic journal market and focuses on publishers doing innovative projects. Discusses predominate market models; publishers and the Internet; issues surrounding electronic journals: pricing, security, electronic page layout, copyright, backfile availability, reliability, and accessibility. Highlights selected…
Descriptors: Access to Information, Computer Security, Copyrights, Electronic Journals

Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Beevers, C. E.; And Others – Computers & Education, 1995
Describes an educational experiment at Heriot-Watt University (Edinburgh, Scotland) in which 40% of the mathematics assessment for the students' first year was undertaken by a computer program. Discusses aspects of security, human-computer interface, and educational matters such as partial credit, and presents implications for the future.…
Descriptors: Academic Achievement, Computer Interfaces, Computer Managed Instruction, Computer Security
Online Libraries and Microcomputers, 1999
Presents guidelines developed by the ICOLC (International Coalition of Library Consortia) regarding vendor contracts and negotiations that involve electronic information resources. Highlights include content issues, including HTML, use of printers, and use of multimedia; and platform issues, including system architecture, access control, security…
Descriptors: Access to Information, Computer Printers, Computer Security, Consortia

Mudge, Stephen M. – Innovations in Education and Training International, 1999
Discusses advantages and disadvantages of using the Internet for delivering teaching modules and makes recommendations for successful use of the Internet. Highlights include the availability of information at all times and from remote locations, multimedia capabilities, infrastructure needed, security issues, updating, needed skills, and…
Descriptors: Access to Information, Computer Assisted Instruction, Computer Literacy, Computer Security

Kappelman, Leon A.; Johnson, Jerry L.; Rosmond, Kathy – Journal of the American Society for Information Science, 1999
Outlines initiatives for government agencies to help mitigate risks of the year-2000 computer problem. Highlights include courts; criminal justice systems; electric power generation and distribution systems; emergency response systems; environmental agencies; financial institutions; insurance industry; petrochemical refineries and oil/gas-line…
Descriptors: Computer Security, Computer System Design, Federal Government, Government (Administrative Body)

Rowe, Neil C.; Schiavo, Sandra – Computers & Education, 1998
Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…
Descriptors: Alarm Systems, Artificial Intelligence, Computer Assisted Instruction, Computer Networks
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines

Perks, Dennis J.; Gavitt, Donna R.; Olivo, John J. – Computers & Education, 1997
Developing an Internet acceptable use policy is the first step in bringing technological change to the classroom. This article defines educator's proactive responsibilities and provides a policy shell (privilege, "netiquette," security, vandalism, legal issues, warranties, and user agreements) to formulate individual school policies.…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Guidelines
Weippl, Edgar R.; Tjoa, A Min – Interactive Technology and Smart Education, 2005
Privacy is a requirement that has not received the required attention in most e-learning platforms. Based on the results of a survey we identified weaknesses of e-learning platforms and describe improvements we made in Moodle as a proof-of-concept.
Descriptors: Electronic Learning, Privacy, Improvement, Computer Security
Spicer, Donald Z.; Deblois, Peter B. – EDUCAUSE Review, 2004
This article features the EDUCAUSE Current Issues Survey. Administered by the EDUCAUSE Current Issues Committee, whose members review and recommend the set of issues to be presented each year, the survey identifies the issues that leaders in higher education information technology see as their most critical IT challenges. The Top-Ten current IT…
Descriptors: Information Technology, Higher Education, Surveys, Financial Support
Rothschild, Daniel; Rezmierski, Virginia – EDUCAUSE Quarterly, 2004
The Computer Incident Factor Analysis and Categorization (CIFAC) Project at the University of Michigan began in September 2003 with grants from EDUCAUSE and the National Science Foundation (NSF). The project's primary goal is to create a best-practices security framework for colleges and universities based on rigorous quantitative analysis of…
Descriptors: Computer Security, Colleges, Statistical Analysis, Literature Reviews
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Dark, Melissa Jane; Ekstrom, Joseph J.; Lunt, Barry M. – Journal of Information Technology Education, 2006
In December 2001 a meeting of interested parties from fifteen four-year IT programs from the US along with representatives from IEEE, ACM, and ABET (CITC-1) began work on the formalization of Information Technology as an accredited academic discipline. The effort has evolved into SIGITE, the ACM SIG for Information Technology Education. During…
Descriptors: Intellectual Disciplines, Information Technology, Technology Education, Information Science Education