NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,426 to 1,440 of 1,589 results Save | Export
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives
Machovec, George S. – Online Libraries and Microcomputers, 1997
Provides an overview of the electronic journal market and focuses on publishers doing innovative projects. Discusses predominate market models; publishers and the Internet; issues surrounding electronic journals: pricing, security, electronic page layout, copyright, backfile availability, reliability, and accessibility. Highlights selected…
Descriptors: Access to Information, Computer Security, Copyrights, Electronic Journals
Peer reviewed Peer reviewed
Horn, G.; Kroselberg, D.; Muller, K. – Internet Research, 2003
Presents an overview of the security architecture of the IP multimedia core network subsystem (IMS) of the third generation mobile system, known in Europe as UMTS. Discusses IMS security requirements; IMS security architecture; authentication between IMS user and home network; integrity and confidentiality for IMS signalling; and future aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Beevers, C. E.; And Others – Computers & Education, 1995
Describes an educational experiment at Heriot-Watt University (Edinburgh, Scotland) in which 40% of the mathematics assessment for the students' first year was undertaken by a computer program. Discusses aspects of security, human-computer interface, and educational matters such as partial credit, and presents implications for the future.…
Descriptors: Academic Achievement, Computer Interfaces, Computer Managed Instruction, Computer Security
Online Libraries and Microcomputers, 1999
Presents guidelines developed by the ICOLC (International Coalition of Library Consortia) regarding vendor contracts and negotiations that involve electronic information resources. Highlights include content issues, including HTML, use of printers, and use of multimedia; and platform issues, including system architecture, access control, security…
Descriptors: Access to Information, Computer Printers, Computer Security, Consortia
Peer reviewed Peer reviewed
Mudge, Stephen M. – Innovations in Education and Training International, 1999
Discusses advantages and disadvantages of using the Internet for delivering teaching modules and makes recommendations for successful use of the Internet. Highlights include the availability of information at all times and from remote locations, multimedia capabilities, infrastructure needed, security issues, updating, needed skills, and…
Descriptors: Access to Information, Computer Assisted Instruction, Computer Literacy, Computer Security
Peer reviewed Peer reviewed
Kappelman, Leon A.; Johnson, Jerry L.; Rosmond, Kathy – Journal of the American Society for Information Science, 1999
Outlines initiatives for government agencies to help mitigate risks of the year-2000 computer problem. Highlights include courts; criminal justice systems; electric power generation and distribution systems; emergency response systems; environmental agencies; financial institutions; insurance industry; petrochemical refineries and oil/gas-line…
Descriptors: Computer Security, Computer System Design, Federal Government, Government (Administrative Body)
Peer reviewed Peer reviewed
Rowe, Neil C.; Schiavo, Sandra – Computers & Education, 1998
Describes an intelligent tutor incorporating a program using artificial-intelligence planning methods to generate realistic audit files reporting actions of simulated users and intruders of a UNIX system, and a program simulating the system afterwards that asks students to inspect the audit and fix problems. Experiments show that students using…
Descriptors: Alarm Systems, Artificial Intelligence, Computer Assisted Instruction, Computer Networks
Benson, Allen C. – Computers in Libraries, 1998
Presents tips for building a secure library system to guard against threats like hackers, viruses, and theft. Topics include: determining what is at risk; recovering from disasters; developing security policies; developing front-end security; securing menu systems; accessing control programs; protecting against damage from viruses; developing…
Descriptors: Access to Information, Computer Security, Computer System Design, Guidelines
Peer reviewed Peer reviewed
Perks, Dennis J.; Gavitt, Donna R.; Olivo, John J. – Computers & Education, 1997
Developing an Internet acceptable use policy is the first step in bringing technological change to the classroom. This article defines educator's proactive responsibilities and provides a policy shell (privilege, "netiquette," security, vandalism, legal issues, warranties, and user agreements) to formulate individual school policies.…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Guidelines
Peer reviewed Peer reviewed
Direct linkDirect link
Weippl, Edgar R.; Tjoa, A Min – Interactive Technology and Smart Education, 2005
Privacy is a requirement that has not received the required attention in most e-learning platforms. Based on the results of a survey we identified weaknesses of e-learning platforms and describe improvements we made in Moodle as a proof-of-concept.
Descriptors: Electronic Learning, Privacy, Improvement, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Spicer, Donald Z.; Deblois, Peter B. – EDUCAUSE Review, 2004
This article features the EDUCAUSE Current Issues Survey. Administered by the EDUCAUSE Current Issues Committee, whose members review and recommend the set of issues to be presented each year, the survey identifies the issues that leaders in higher education information technology see as their most critical IT challenges. The Top-Ten current IT…
Descriptors: Information Technology, Higher Education, Surveys, Financial Support
Peer reviewed Peer reviewed
Direct linkDirect link
Rothschild, Daniel; Rezmierski, Virginia – EDUCAUSE Quarterly, 2004
The Computer Incident Factor Analysis and Categorization (CIFAC) Project at the University of Michigan began in September 2003 with grants from EDUCAUSE and the National Science Foundation (NSF). The project's primary goal is to create a best-practices security framework for colleges and universities based on rigorous quantitative analysis of…
Descriptors: Computer Security, Colleges, Statistical Analysis, Literature Reviews
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Peer reviewed Peer reviewed
Direct linkDirect link
Dark, Melissa Jane; Ekstrom, Joseph J.; Lunt, Barry M. – Journal of Information Technology Education, 2006
In December 2001 a meeting of interested parties from fifteen four-year IT programs from the US along with representatives from IEEE, ACM, and ABET (CITC-1) began work on the formalization of Information Technology as an accredited academic discipline. The effort has evolved into SIGITE, the ACM SIG for Information Technology Education. During…
Descriptors: Intellectual Disciplines, Information Technology, Technology Education, Information Science Education
Pages: 1  |  ...  |  92  |  93  |  94  |  95  |  96  |  97  |  98  |  99  |  100  |  ...  |  106