NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,201 to 1,215 of 1,624 results Save | Export
Villano, Matt – Campus Technology, 2008
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Descriptors: Computer Uses in Education, Technological Advancement, Technology Uses in Education, Video Technology
Shermis, Mark D.; Averitt, Jason – 2000
The purpose of this paper is to enumerate a series of security steps that might be taken by those individuals or organizations that are contemplating Web-based tests and performance assessments. From a security viewpoint, much of what goes on with Web-based transactions is similar to other general computer activity, but the recommendations focus…
Descriptors: Computer Security, Data Analysis, Performance Based Assessment, World Wide Web
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lei, Kimfong; Schmidt, Therese; Schaffer, Scott P.; Um, Eun Joon – Association for Educational Communications and Technology, 2004
The American Society for Training and Development (ASTD) defines human performance technology (HPT) as "a systematic approach to analyzing, improving, and managing performance in the workplace through the use of appropriate and varied interventions." The first step in this approach is the performance analysis (Gilbert, 1978). In this…
Descriptors: Program Effectiveness, Graduate Students, Computer Security, Performance Technology
Edwards, Mark A. – School Administrator, 2003
Describes use of wireless technology system involving laptop computers in Henrico County Public Schools in Richmond, Virginia. Briefly describes some lessons learned about the use of laptops and the major components of the laptop security plan. Reports laptop-supported advances in student achievement. (PKP)
Descriptors: Academic Achievement, Computer Assisted Instruction, Computer Security, Elementary Secondary Education
Kovac, Ron J. – School Business Affairs, 1999
As the Internet proliferates, it drastically increases an institution's level of data insecurity. Hacker attacks can result in denial of service, data corruption or erasure, and passive theft (via spoofing, splicing, or session stealing). To ensure data security, a firewall (screening software program) and a security policy should be implemented.…
Descriptors: Computer Security, Costs, Elementary Secondary Education, Guidelines
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention
Vandegrift, Kay E. – School Library Journal, 1996
Describes procedures for librarians interested in building a World Wide Web site. Highlights include hypertext markup language; home pages; determining audiences and purposes; promoting safety; the planning process, including text length and density, links to external sites, and maintenance; and copyright concerns. (LRW)
Descriptors: Audiences, Computer Security, Copyrights, Planning
Wodarz, Nan – School Business Affairs, 2001
A computer virus is a program that replicates itself, in conjunction with an additional program that can harm a computer system. Common viruses include boot-sector, macro, companion, overwriting, and multipartite. Viruses can be fast, slow, stealthy, and polymorphic. Anti-virus products are described. (MLH)
Descriptors: Computer Security, Computer Software, Electronic Mail, Elementary Secondary Education
Huwe, Terence K. – Computers in Libraries, 2005
The author of this column describes several instances in which secure data on computers were compromised. In each of these instances, a different route was involved in gaining access to the secure data--one by office-based theft, one by hacking, and one by burglary. Is is proposed that the most difficult factor to guarantee in the protection of…
Descriptors: Internet, Computer Security, Electronic Libraries, Information Management
Peer reviewed Peer reviewed
Rajala, Judith B. – T.H.E. Journal, 2004
A computer virus is a program--a piece of executable code--that has the unique ability to replicate. Like biological viruses, computer viruses can spread quickly and are often difficult to eradicate. They can attach themselves to just about any type of file, and are spread by replicating and being sent from one individual to another. Simply having…
Descriptors: Computer Security, Computer Software, Computer Mediated Communication, Internet
Svetcov, Eric – Technology & Learning, 2005
This article provides a list of the essential steps to keeping a school's or district's network safe and sound. It describes how to establish a security architecture and approach that will continually evolve as the threat environment changes over time. The article discusses the methodology for implementing this approach and then discusses the…
Descriptors: Costs, Computer Networks, Computer Security, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Bergren, Martha Dewey – Journal of School Nursing, 2004
School nurses access an enormous amount of information through the Internet. Although most avid computer users are savvy to the threat of viruses to the integrity of data, many who surf the Web do not know that their data and the functioning of their computer is at risk to another hidden threat--spyware. This article will describe spyware, why it…
Descriptors: School Nurses, Confidentiality, Risk, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Black, Thomas C.; Mohr, John – College and University, 2004
In this electronic age, where information is digital and service is virtual, the registrar profession is changing rapidly to keep up with increasing standards and expectations. EDI and now XML standards enable system-to-system exchanges of academic records information. While many of the registrar's profession display student academic records under…
Descriptors: Academic Records, Technological Advancement, Computer Security, Information Management
Peer reviewed Peer reviewed
Direct linkDirect link
Cordes, Christofer Sean – EDUCAUSE Quarterly, 2005
Spyware is the general term that describes a collection of technologies that help external parties in "gathering information about a person or organization without their knowledge." In addition to the minor annoyances spyware generates, such as redirected pages, redirected searches, and pop-up ads, a spyware infection can have more malicious…
Descriptors: Internet, Prevention, Computer Security, Information Technology
Huang, Phil – Computers in Libraries, 2007
By providing the public with online computing facilities, librarians make available a world of information resources beyond their traditional print materials. Internet-connected computers in libraries greatly enhance the opportunity for patrons to enjoy the benefits of the digital age. Unfortunately, as hackers become more sophisticated and…
Descriptors: Computers, Computer Software, Internet, Computer Security
Pages: 1  |  ...  |  77  |  78  |  79  |  80  |  81  |  82  |  83  |  84  |  85  |  ...  |  109