NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,486 to 1,500 of 1,639 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Teles, Elizabeth J.; Hovis, R. Corby – Community College Journal, 2002
Describes recent federal legislation (H.R. 3394) that charges the National Science Foundation with offering more grants to colleges and universities for degree programs in computer and network security, and to establish trainee programs for graduate students who pursue doctoral degrees in computer and network security. Discusses aspects of…
Descriptors: College Role, Community Colleges, Computer Security, Crime
Swan, James – Rural Libraries, 1996
Presents a four-phase plan for small libraries strategizing for automation: inventory and weeding, data conversion, implementation, and enhancements. Other topics include selecting a system, MARC records, compatibility, ease of use, industry standards, searching capabilities, support services, system security, screen displays, circulation modules,…
Descriptors: Computer Security, Computer Selection, Data Conversion, Library Automation
Patel, Praj – Information Management & Technology, 1997
Because they bring a large gain in productivity for a small investment in software, training, and overhead, organizations are embracing intranets: private World Wide Web sites that limit access to select groups by placing the Web behind a "firewall" or using the server's ability to provide security. Discusses intranets, document…
Descriptors: Access to Information, Computer Security, Cooperative Programs, Cost Effectiveness
Bernbom, Gerald; And Others – CAUSE/EFFECT, 1994
Faced with the challenge of providing security across a complex, multiprotocol institutional information network, computing services at Indiana University implemented a responsive, collaborative security architecture designed for the future. Information systems design, security principles and strategy, and implementation are described. (Author/MSE)
Descriptors: Access to Information, College Administration, Computer Networks, Computer Oriented Programs
Vane-Tempest, Stewart – Information Management & Technology, 1995
Presents a guide for selecting an optional disc system. Highlights include storage hierarchy; standards; data life cycles; security; implementing an optical jukebox system; optimizing the system; performance; quality and reliability; software; cost of online versus near-line; and growing opportunities. Sidebars provide additional information on…
Descriptors: Computer Security, Computer Selection, Computer System Design, Data
Peer reviewed Peer reviewed
Gattiker, Urs E.; Perlusz, Stefano; Bohmann, Kristoffer – Internet Research, 2000
Illustrates some of the challenges that electronic commerce practitioners and researchers face, focusing on business to business (B2B) transactions. Highlights include a conceptual framework of Web user behavior; purchasing context; socio-demographic characteristics; cultural factors; economic factors; attitudes toward information technology;…
Descriptors: Computer Attitudes, Computer Security, Cultural Influences, Demography
Littman, Marlyn K. – HyperNexus, 1997
The pervasive use of communication technology in schools and universities requires increased security to safeguard information confidentiality, integrity, availability, utility, and authenticity. This article, the first of two, examines procedures for implementing security policy, techniques for minimizing vulnerability, and techniques for…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design
Machovec, George S., Ed. – Online Libraries and Microcomputers, 1996
Examines issues surrounding the publication of electronic journals and describes publisher solutions to these issues. Topics include pricing, security, electronic page layout, copyright, backfile availability, and reliability and accessibility of data. Describes some electronic journal projects and lists electronic journal services available via…
Descriptors: Access to Information, Computer Security, Copyrights, Costs
Peer reviewed Peer reviewed
Gulliford, Bradley – Library Trends, 1998
Describes changes in services of the United Technologies Corporation Information Network from a traditional library system to a virtual system of World Wide Web sites, a document-delivery unit, telephone and e-mail reference, and desktop technical support to provide remote access. Staff time, security, and licensing issues are addressed.…
Descriptors: Change, Computer Security, Corporate Libraries, Document Delivery
Peer reviewed Peer reviewed
Direct linkDirect link
Goel, Sanjay; Pon, Damira; Bloniarz, Peter; Bangert-Drowns, Robert; Berg, George; Delio, Vince; Iwan, Laura; Hurbanek, Thomas; Schuman, Sandoor P.; Gangolly, Jagdish; Baykal, Adnan; Hobbs, Jon – Journal on Educational Resources in Computing, 2006
A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted…
Descriptors: Feedback (Response), Curriculum Development, Hospitals, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Prichard, Janet J.; MacDonald, Laurie E. – Journal of Information Technology Education, 2004
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
Descriptors: Terrorism, Textbooks, Computer Security, Public Agencies
Peer reviewed Peer reviewed
Direct linkDirect link
Sandvig, J. Christopher – Campus-Wide Information Systems, 2004
The growth of the Internet has greatly increased the demand for server-side programming courses at colleges and universities. Students enrolled in such courses must be provided with server-based accounts that support the technologies that they are learning. The process of creating, managing and removing large numbers of student server accounts is…
Descriptors: Internet, Courseware, Computer System Design, Computer Software Reviews
Woo, Stu – Chronicle of Higher Education, 2006
San Jose State University is planning to ban Skype, a popular Internet telephone service, from the campus network because of concerns about security and bandwidth. University administrators say that the technical aspects that make Skype effective also make it dangerous and potentially crippling to a university's network bandwidth. Skype has a…
Descriptors: Foreign Countries, Computer Networks, Computer Security, College Faculty
Nikkel, Terry; Kutty, Ashwin – Computers in Libraries, 2004
Dalhousie is a medium-sized university, with about 15,000 FTE students, located in Halifax, Nova Scotia. It is one of Canada's oldest and most prestigious universities, yet, like many other public institutions, it frequently suffers from a lack of adequate funding to fulfill all the conflicting needs of the various faculties and departments. This…
Descriptors: Foreign Countries, Research Libraries, Internet, Library Services
Smith, Peter, Ed. – Association of Small Computer Users in Education (ASCUE), 2009
The Association of Small Computer Users in Education (ASCUE) is a dynamic organization for people interested in small college technology issues. Its members include information technology professionals, instructional technologists, and faculty members from all over the world who use computers and technology to support teaching and learning. The…
Descriptors: Small Colleges, Information Technology, Educational Technology, Organizations (Groups)
Pages: 1  |  ...  |  96  |  97  |  98  |  99  |  100  |  101  |  102  |  103  |  104  |  ...  |  110