NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,426 to 1,440 of 1,629 results Save | Export
Khosrowpour, Mehdi; Amoroso, Donald – 1991
With the realization that microcomputers provide an extraordinary value to the organization follows the need to address a variety of issues in order to more effectively manage these resources. Each of the 14 chapters, consisting of papers written by different authors, represents a different perspective existing in organizations with respect to the…
Descriptors: Administration, Artificial Intelligence, Computer Science Education, Computer Security
National Association of State Universities and Land-Grant Colleges, 2004
This document represents the higher education and library community's guiding public policy agenda on information technology (IT) for the current year. The Higher Education Information Technology (HEIT) Alliance is a coalition of 11 national higher education and library associations, whose members represent a broad array of stakeholders on college…
Descriptors: Telecommunications, Library Associations, Information Technology, Intellectual Property
Nelson, Jesse – Media & Methods, 1997
Discusses the benefits of school library security, software security, and computer security systems. Describes specific products for each type of security system. A sidebar lists names and addresses of security manufacturers and distributors. (AEF)
Descriptors: Alarm Systems, Computer Security, Computer Software, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Peer reviewed Peer reviewed
Sun, Wei-qiang; Li, Jin-sheng; Hong, Pei-lin – Internet Research, 2003
Multicasting is a necessity for a broadband metro-area-network; however security problems exist with current multicast protocols. A stateful multicast access control mechanism, based on MAPE, is proposed. The architecture of MAPE is discussed, as well as the states maintained and messages exchanged. The scheme is flexible and scalable. (Author/AEF)
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Beckett, George – Library Software Review, 1994
Describes a new software program called "Everywhere Access" that provides remote access to libraries' networked personal computers and that is suitable for use with the Internet. Highlights include installation; operation; security; standards issues; documentation and technical support; and potential uses and applications. (LRW)
Descriptors: Access to Information, Computer Security, Computer Selection, Computer Software
Wodarz, Nan – School Business Affairs, 1999
Describes a technology consultant's training of promising students as network administrators as part of a high-school work-study program. Success hinged on combining work with education, providing supervision and mentoring, using knowledgeable trainers, not substituting students for staff shortcomings, and installing adequate computer security.…
Descriptors: Computer Networks, Computer Security, Consultants, Cooperative Programs
Peer reviewed Peer reviewed
McKimmy, Paul B. – International Journal of Instructional Media, 2005
In April 2002, the Technology Advisory Committee of the University of Hawaii-Manoa College of Education (COE) prioritized the upgrade of existing instructional computer labs. Following several weeks of research and discussion, a decision was made to support wireless and mobile technologies during the upgrade. In June 2002, the first of three…
Descriptors: Resource Allocation, Costs, Educational Technology, Telecommunications
Lafee, Scott – School Administrator, 2005
In an era of digital technologies, school districts find themselves on a cutting edge, one that slices both ways. Technological tools like the Internet, e-mail, networked computers and such have revolutionized the way children are taught and schools are run, but they also have created new management challenges and ethical issues that many school…
Descriptors: Educational Technology, Computer Uses in Education, Computer Security, Ethics
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McGreal, Rory – International Review of Research in Open and Distance Learning, 2004
The Internet is the world's largest knowledge common and the information source of first resort. Much of this information is open and freely available. However, there are organizations and companies today that are trying to close off the Internet commons and make it proprietary. These are the "copyright controllers." The preservation of the…
Descriptors: Copyrights, Information Sources, Internet, Ethics
Sánchez, Inmaculada Arnedillo, Ed.; Isaías, Pedro, Ed. – International Association for Development of the Information Society, 2014
These proceedings contain the papers of the 10th International Conference on Mobile Learning 2014, which was organised by the International Association for Development of the Information Society, in Madrid, Spain, February 28-March 2, 2014. The Mobile Learning 2014 International Conference seeks to provide a forum for the presentation and…
Descriptors: Conference Papers, Telecommunications, Handheld Devices, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Brown, Justine – T.H.E. Journal, 2006
Over the past five years, the No Child Left Behind Act, with its mandates for collecting and documenting student achievement statistics, has fueled a surge in the volume of data collected by schools, districts, and state education departments. This information explosion has gone hand in hand with technology's growing affordability and…
Descriptors: Federal Legislation, Teacher Effectiveness, Data Collection, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – Discourse: Studies in the Cultural Politics of Education, 2007
Whilst the association of risk with schools is predominately a negative one, fostering images of potential dangers, this paper draws upon a socio-cultural counter-discourse to explore the perceived benefits of certain risk taking activities within educational establishments. Using research data on school Internet "misuse" it is argued…
Descriptors: Student Attitudes, Internet, Risk, Student Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2007
According to a January 2007 survey by the Pew Internet & American Life Project, 55 percent of teens (ages 12 to 17) report having created a personal profile online, and an equal number regularly use social networking sites such as MySpace or Facebook. Of those, 91 percent use the sites to stay in touch with friends they see frequently. With all…
Descriptors: Internet, Social Networks, Adolescents, Student Motivation
Pages: 1  |  ...  |  92  |  93  |  94  |  95  |  96  |  97  |  98  |  99  |  100  |  ...  |  109