NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,276 to 1,290 of 1,635 results Save | Export
Foster, Andrea L. – Chronicle of Higher Education, 2003
Describes why a new law requiring California colleges to warn people of security breaches involving their computerized personal data has administrators worried about both cost and liability. (EV)
Descriptors: Compliance (Legal), Computer Security, Disclosure, Higher Education
Boerner, Gerald L. – Syllabus, 2002
Discusses the use of wireless local area networks (WLANs) on college campuses. Highlights include traditional wired networks; cost, speed, and reliability; wireless networking standards; mobility; installation speed, simplicity, and flexibility; reduced cost of ownership; scalability; security issues; and a glossary of WLAN terms. (LRW)
Descriptors: Computer Security, Costs, Glossaries, Higher Education
Peer reviewed Peer reviewed
Nackerud, Shane A. – Information Technology and Libraries, 1998
Describes CGI (Common Gateway Interface) scripts that are available on the Web and explains how librarians can use them to make Web pages more interactive. Topics include CGI security; Perl scripts; UNIX; and HTML. (LRW)
Descriptors: Computer Interfaces, Computer Security, Gateway Systems, Library Automation
Peer reviewed Peer reviewed
Gritzalis, Stefanos; Aggelis, George; Spinellis, Diomidis – Internet Research, 1999
Discusses downloadable executable content, or mobile code, on the World Wide Web; evaluates the security features offered by the Java and Safe-Tcl programming languages; and describes the basic mechanisms of each of the proposed security models. Presents current implementations, as well as upcoming extensions, and evaluates their efficiency and…
Descriptors: Computer Security, Evaluation Methods, Futures (of Society), Models
Peer reviewed Peer reviewed
Smith, Martha – Library Trends, 2001
Explains the concept of global information justice and describes it as an ethical ideal, as an organizing principle for a model for analysis, and as a direction for policy making. Discusses the use of new technologies; access to technology; ownership; privacy; security; community; and the Universal Declaration of Human Rights. (Author/LRW)
Descriptors: Computer Security, Ethics, Global Approach, Intellectual Property
Carlson, Scott – Chronicle of Higher Education, 2002
Discusses how colleges are creating offices to handle crimes, near-crimes, human errors, dramas, and assorted foibles on increasingly Internet-connected campuses. (EV)
Descriptors: College Students, Computer Security, Crime Prevention, Higher Education
Peer reviewed Peer reviewed
Liao, Gen-Yih; Hwang, Jing-Jang – Internet Research, 2001
Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)
Descriptors: Business, Computer Oriented Programs, Computer Security, Consumer Economics
Peer reviewed Peer reviewed
Direct linkDirect link
Bishop, Matt – Journal on Educational Resources in Computing, 2006
This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…
Descriptors: Political Science, Computer Security, Humanities, Context Effect
Friedman, Stan, Sr. – Library Journal, 2004
This article describes the results of the 19th annual Computers in Libraries Conference in Washington, DC on March 10-12, 2004. The conference peered into the future, drew lessons from the past, and ran like clockwork. Program chair Jane Dysart and her organizing committee are by now old hands, bringing together three keynote addresses, 100…
Descriptors: Information Technology, Internet, Privacy, Libraries
Stover, Del – Education Digest: Essential Readings Condensed for Quick Review, 2005
This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…
Descriptors: Behavior Problems, Computer Security, High School Students, Crime Prevention
Huwe, Terence – Computers in Libraries, 2005
In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…
Descriptors: Electronic Libraries, Publishing Industry, Information Technology, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
Kabir, Md. H.; Shoja, Gholamali C.; Manning, Eric G. – Interactive Technology and Smart Education, 2006
Streaming audio/video contents over the Internet requires large network bandwidth and timely delivery of media data. A streaming session is generally long and also needs a large I/O bandwidth at the streaming server. A streaming server, however, has limited network and I/O bandwidth. For this reason, a streaming server alone cannot scale a…
Descriptors: Computer System Design, Intellectual Property, Internet, Simulation
Peer reviewed Peer reviewed
McLaughlin, Josetta; Pavelka, Deborah; McLaughlin, Gerald – Journal of Education for Business, 2005
A significant trend in higher education evolving from the wide accessibility to the Internet is the availability of an ever-increasing supply of data on Web sites for use by professors, students, and researchers. As this usage by a wider variety of users grows, the ability to judge the integrity of the data, the related findings, and the Web site…
Descriptors: Web Sites, Internet, Evaluation, Data
Peer reviewed Peer reviewed
Direct linkDirect link
Ramaswami, Rama – T.H.E. Journal, 2008
As technology grows more pervasive in education, the data recovery issues that school systems encounter are becoming increasingly problematic, as districts work to accommodate a range of concerns that do not encumber commercial businesses. State and federal laws often require schools to report on student populations and educational progress…
Descriptors: Elementary Secondary Education, Educational Technology, Computer Uses in Education, Technology Integration
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Pages: 1  |  ...  |  82  |  83  |  84  |  85  |  86  |  87  |  88  |  89  |  90  |  ...  |  109