Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Krunic, Tanja; Ruzic-Dimitrijevic, Ljiljana; Petrovic, Branka; Farkas, Robert – Journal of Information Technology Education, 2006
The Advanced Technical School from Novi Sad set up a completely new study group for web design in 2004. The main goals of the paper are to explain the steps that were taken in starting this group, and to present the educational program based on our own research through the organization of the group and course descriptions. Since there is a…
Descriptors: Investigations, Prior Learning, Course Descriptions, Internet
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security
Cole, Timothy W. – Computers in Libraries, 1995
Describes installation and configuration of Mosaic and a World Wide Web (WWW) site at Grainger Library. Challenges include choosing a WINSOCK; customizing Mosaic for public-access computers; reducing security risks; maximizing Multipurpose Internet Mail Extensions (MIME); designing a home page; producing Hypertext Markup Language (HTML) documents.…
Descriptors: Academic Libraries, Computer Networks, Computer Security, Computer Software Development
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This April 16, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Shimmering with Stories" (Biemiller, Lawrence); (2) "Cultures…
Descriptors: Foreign Countries, Higher Education, College Athletics, College Faculty
Chronicle of Higher Education, 2005
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This April 1, 2005 issue of "Chronicle of Higher Education" includes the following articles: (1) "Hollywood Profits v. Technological Progress" (Ben-Atar, Doron); (2)…
Descriptors: Higher Education, Educational Technology, Copyrights, Foreign Countries
McAlpine, Mhairi – E-Learning, 2005
As awarding bodies modernise their procedures and incorporate elements of e-assessment into their qualifications, e-portfolios are emerging as a popular method of allowing candidates to display their abilities. All major United Kingdom awarding bodies now accept evidence from e-portfolio products for at least some of their qualifications. Although…
Descriptors: Portfolios (Background Materials), Foreign Countries, Student Certification, Portfolio Assessment
Technology & Learning, 2005
In recent years, the widespread availability of networks and the flexibility of Web browsers have shifted the industry from a client-server model to a Web-based one. In the client-server model of computing, clients run applications locally, with the servers managing storage, printing functions, and network traffic. Because every client is…
Descriptors: Computers, Computer System Design, Internet, Computer Uses in Education
Smith, Michael Clay; Fossey, Richard – 1995
This book discusses issues related to campus crime and offers administrators suggestions and checklists that can be used to evaluate current procedures and defuse potential problems. Chapters cover: (1) "The Campus: A Sanctuary?"; (2) "The Complexion of Campus Crime Today"; (3) "The Concept of Crime and the Shape of…
Descriptors: Computer Security, Crime Prevention, Due Process, Evidence (Legal)
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security
Marzo-Lazaro, J. L.; Verdu-Carbo, T.; Fabregat-Gesa, R. – 1998
This paper describes a solution to the user identification and tracking problem within an educational World Wide Web environment. The paper begins with an overview of the Teaching Support System project at the University of Girona (Spain); the main objective of the project is to create an integrated set of tools for teachers to use to create and…
Descriptors: Computer Interfaces, Computer Security, Computer Software Development, Computer System Design
Graafland-Essers, Irma; Cremonini, Leon; Ettedgui, Emile; Botterman, Maarten – RAND Corporation, 2003
This report presents the current understanding of the advancement of the Information Society within the European Union and countries that are up for accession in 2004, and is based on the SIBIS (Statistical Indicators Benchmarking the Information Society) surveys and analyses per SIBIS theme and country. The report is unique in its coherent and…
Descriptors: Information Technology, Foreign Countries, Technological Advancement, Measurement

Peer reviewed
Direct link
