NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,306 to 1,320 of 1,639 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Stella, Antony; Gnanam, A. – Higher Education: The International Journal of Higher Education and Educational Planning, 2004
Integration of technology in all forms of education has narrowed down the gap between the on- and off-campus students and has resulted in the use of the more broad-based term "distributed learning". Consequently, distance learning is seen as a subset of distributed learning, focusing on students who may be separated in time and space from their…
Descriptors: Quality Control, Distance Education, Technology Integration, Educational Technology
Mutch, Andrew; Ventura, Karen – Computers in Libraries, 2006
Every place has it--coffee shops, bookstores, universities ... and now libraries are offering wireless Internet access too. At the Waterford Township Public Library (Waterford, Michigan), Andrew Mutch created a wide-open wireless network using Public IP open source software. About 20 miles away, at the Novi Public Library (Novi, Michigan), Karen…
Descriptors: Telecommunications, Computer Networks, Internet, Public Libraries
Peer reviewed Peer reviewed
Direct linkDirect link
Ferguson, Aaron J. – EDUCAUSE Quarterly, 2005
The United States Military Academy (USMA) at West Point had a problem with some cadets clicking on suspicious attachments and embedded links, significantly affecting network performance and resource availability. West Point information technology leadership needed a way to increase e-mail security awareness in hopes of maintaining a strong…
Descriptors: Information Technology, Educational Technology, Internet, Electronic Mail
Gale, Doug – Campus Technology, 2006
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Descriptors: Human Body, Identification, Technological Advancement, Genetics
Wolfsberg, Jeffrey S. – Education Digest: Essential Readings Condensed for Quick Review, 2006
Once, targets of bullying had to endure it only at school. Now, with the increasing prevalence of cyberbullying it can follow them home and go on 24 hours a day. For students who have been exposed to cyberbullying themselves, for parents who have either been exposed to it or are seeing their child experience it, and for educators who have either…
Descriptors: Computer Mediated Communication, Bullying, Computer Security, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Gong, Tao; Cai, Zixing – International Journal on E-Learning, 2006
To overcome weakness and faults of a web-based e-learning course such as Artificial Intelligence (AI), an immune agent was proposed, simulating a natural immune mechanism against a virus. The immune agent was built on the multi-dimension education agent model and immune algorithm. The web-based AI course was comprised of many files, such as HTML…
Descriptors: Educational Technology, Internet, Online Courses, Artificial Intelligence
Olson, Gary A. – Chronicle of Higher Education, 2007
Many professors, staff members, and even administrators see campus computers and e-mail accounts as their own private property--a type of employment benefit provided with no constraints on use. The fact is, universities "assign" computer equipment to personnel as tools to help them perform their jobs more effectively and efficiently, in the same…
Descriptors: Ethics, College Faculty, Computer Security, Electronic Mail
Riley, Sheila – Technology & Learning, 2007
It is not always easy to find the balance between protecting students from Internet dangers and distractions and reaping its benefits--but it is certainly on every district's tech priority list. Sharnell Jackson, chief e-learning officer for the 415,000-student Chicago Public Schools, and Miguel Guhlin, director of instructional technology…
Descriptors: Computer Security, School Safety, Computer Mediated Communication, Parent Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yi, Qing; Zhang, Jinming; Chang, Hua-Hua – ETS Research Report Series, 2006
Chang and Zhang (2002, 2003) proposed several baseline criteria for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria were obtained from theoretical derivations that assumed uniformly randomized item selection. The current study investigated potential damage caused…
Descriptors: Computer Assisted Testing, Adaptive Testing, Test Items, Computer Security
Helal, Sumi, Ed.; Oie, Yuji, Ed.; Chang, Carl, Ed.; Murai, Jun, Ed. – 2003
This proceedings from the 2003 Symposium on Applications and the Internet (SAINT) contains papers from sessions on: (1) mobile Internet, including a target-driven cache replacement policy, context-awareness for service discovery, and XML transformation; (2) collaboration technology I, including human-network-based filtering, virtual collaboration…
Descriptors: Computer Oriented Programs, Computer Security, Information Retrieval, Information Services
Peer reviewed Peer reviewed
Bruhn, Mark; Gettes, Michael; West, Ann – Educause Quarterly, 2003
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Elementary Secondary Education
Peer reviewed Peer reviewed
Prevelakis, Vassilis; Keromytis, Angelos – Internet Research, 2003
Proposes the use of a special purpose drop-in firewall/VPN gateway called Sieve, that can be inserted between the mobile workstation and the network to provide individualized security services for that particular station. Discusses features and advantages of the system and demonstrates how Sieve was used in various application areas such as at…
Descriptors: Computer Networks, Computer Security, Computer Software Development, Computer System Design
Peer reviewed Peer reviewed
Miladinovic, Igor; Stadler, Johannes – Internet Research, 2003
Introduces an extension of the Session Initiation Protocol (SIP) for closed multiparty conferences; the extension expands SIP for discovery of participant identities in a conference, and ensures that each participant is notified before a new participant joins. Verifies this extension by applying it to two SIP conference models. Concludes with an…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Peer reviewed Peer reviewed
Mhlaba, Sondlo Leonard – Government Information Quarterly, 1995
Discusses origins of Transborder Data Flows (TDFs) as an international problem in the early 1970s. Shows how technological development in telecommunications and networks has made regulation more complex and urgent. Recommends the internationalization of the Key Escrowed Encryption System (KEES) and the development of broad international TDF…
Descriptors: Coding, Computer Security, Copyrights, Information Transfer
Peer reviewed Peer reviewed
Panepinto, Joe – Telematics and Informatics, 1995
Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)
Descriptors: Computer Security, Confidential Records, Electronic Mail, Federal Legislation
Pages: 1  |  ...  |  84  |  85  |  86  |  87  |  88  |  89  |  90  |  91  |  92  |  ...  |  110