Publication Date
In 2025 | 25 |
Since 2024 | 163 |
Since 2021 (last 5 years) | 423 |
Since 2016 (last 10 years) | 647 |
Since 2006 (last 20 years) | 1225 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Campus Technology, 2008
This article features the 14 winners of the 2008 Campus Technology Innovators. This article offers an insider's view of the winners' campus technology initiatives, their project leads, and vendor partners jointly recognized for a unique ability to advance teaching, learning, administration, and operation on North American college and university…
Descriptors: Emergency Programs, Computer Uses in Education, Educational Innovation, Higher Education
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Connolly, Mary V. – 1997
The Internet is a network of networks, sharing the same protocol and linking universities, research communities, businesses, and individuals world wide. In this new global information infrastructure, all citizens need to understand the power and pitfalls of the technology in order to function as responsible members. This paper discusses issues…
Descriptors: Access to Information, Computer Networks, Computer Security, Copyrights
Kendall, Diane S.; Marsh, Merle – 2002
This booklet presents questions and answers on everything from how to find out what technology students will need for college to ideas for handling technology emergencies when they are there at college. Information and selected resources are provided under the following questions that head each section: "How do I find out what technology I should…
Descriptors: College Students, Computer Security, Computer Selection, Computer Software Selection
Institute for Information Studies, Queenstown, MD. – 1999
This collection of commissioned papers provides a variety of perspectives on the impact of global information networks. The following articles are included: "The Promise of Global Networks: An Introduction" (Jorge Reina Schement); "Architecture and Expectations: Networks of the World--Unite!" (Marjory S. Blumenthal); "The…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Security

Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education

Yau, Joe C. K; Hui, Lucas C. K.; Cheung, Bruce; Yiu, S. M. – Internet Research, 2003
Presents a mechanism, the Secure e-Course eXchange (eCX) designed to protect learning material from unauthorized dissemination, and shows how this mechanism can be integrated in the operation model of online learning course providers. The design of eCX is flexible to fit two operating models, the Institutional Server Model and the Corporate Server…
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Computer Security, Computer Software Development
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Daehn, Ralph M. – Computers in Libraries, 2000
Explains the public printing services available at computer terminals for patrons at the University of Guelph (Ontario) libraries. Highlights include configurations of the public workstations; client and server hardware and software; security features; cost projections; and printing charges. (LRW)
Descriptors: Academic Libraries, Computer Printers, Computer Security, Computer Software
Carter, Kim – Technology & Learning, 2001
Describes benefits of programs where schools provide laptop computers for each student. Topics include results of studies that show positive learning outcomes; funding options; implementation; protecting the equipment; resources for learning about laptop programs; staff training and support; and future possibilities, including the implications of…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer Security, Educational Finance
Maltz, Leslie; DeBlois, Peter D. – EDUCAUSE Review, 2005
Administered by the EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, the sixth annual EDUCAUSE Current Issues Survey was conducted in December of 2004. Survey participants--the primary representatives, typically CIOs, of EDUCAUSE member institutions--were asked to check up to…
Descriptors: Information Technology, Higher Education, Surveys, Financial Support
Henning, Marcus – Internet and Higher Education, 2004
In the current information age, there is a growing use of and reliance on the Internet. One area of concern for educators is the communication of information using an electronic questionnaire interface. Therefore, it seems pertinent to look at the issue of dissemination of Internet questionnaire information and the integrity of this process.…
Descriptors: Integrity, Questionnaires, Conflict Resolution, Internet
Dark, Melissa Jane; Ekstrom, Joseph J.; Lunt, Barry M. – Journal of Information Technology Education, 2006
In December 2001 a meeting of interested parties from fifteen four-year IT programs from the US along with representatives from IEEE, ACM, and ABET (CITC-1) began work on the formalization of Information Technology as an accredited academic discipline. The effort has evolved into SIGITE, the ACM SIG for Information Technology Education. During…
Descriptors: Intellectual Disciplines, Information Technology, Technology Education, Information Science Education
Dempsey, Bert J., Ed.; Jones, Paul, Ed. – 1998
This book gives an overview of the leading-edge Internet application areas (streaming multimedia, collaborative tools, Web databases) and key information policy issues (privacy, censorship, information quality, and more). The text serves as a primer on understanding the forces--economic, legal, social, as well as technological--that are shaping…
Descriptors: Censorship, Computer Security, Databases, Distance Education
Willemssen, Joel C. – 1999
This document provides testimony on the U.S. Department of Education's efforts to ensure that its computer systems supporting critical student financial aid activities will be able to process information reliably through the turn of the century. After providing some background information, the statement recaps prior findings and the actions that…
Descriptors: Computer Security, Computer Software, Computer System Design, Federal Government