NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,156 to 1,170 of 1,589 results Save | Export
Brydolf, Carol – Education Digest: Essential Readings Condensed for Quick Review, 2007
As principal of the School of the Arts in San Francisco, Donn Harris is passionate about protecting his students' experiments in free expression. But about two years ago he encountered an example of creative student speech he couldn't support--a nasty post on the MySpace.com Web site that targeted some of the school's students. Deciding that his…
Descriptors: Social Networks, Principals, High Schools, Technology Uses in Education
Gunter, Glenda A. – MultiMedia Schools, 1997
Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)
Descriptors: Computer Security, Computer Software, Downloading, Floppy Disks
Peer reviewed Peer reviewed
Lee, M. C.; Fung, Chun-Kan – Journal of the American Society for Information Science and Technology, 2003
Discusses network denial-of-service attacks which have become a security threat to the Internet community and suggests the need for reliable authentication protocols in client-server applications. Presents a public-key based authentication and key establishment protocol coupled with a client puzzle protocol and validates it through formal logic…
Descriptors: Computer Networks, Computer Security, Internet, Logic
Peer reviewed Peer reviewed
Kinkus, Jane F. – Issues in Science & Technology Librarianship, 2002
Discusses issues related to computer security, including confidentiality, integrity, and authentication or availability; and presents a selected list of Web sites that cover the basic issues of computer security under subject headings that include ethics, privacy, kids, antivirus, policies, cryptography, operating system security, and biometrics.…
Descriptors: Children, Computer Security, Confidentiality, Cryptography
Olsen, Florence – Chronicle of Higher Education, 2002
Discusses how colleges are struggling with an increasing number of attacks on their computer systems; as attacks increase, they face tough, expensive challenges in keeping intruders out. (EV)
Descriptors: Computer Networks, Computer Security, Computers, Crime
Smith, Clifton – Australian Science Teachers' Journal, 2001
Describes the development of a security science degree as the emerging applied science of the protection of individuals and assets. Proposes the themes of physical, electronic, information security and facility management as scientific applications for the course. (Author/MM)
Descriptors: Computer Security, Course Descriptions, Higher Education, Science Education
Peer reviewed Peer reviewed
Hinojosa, Patrick – T.H.E. Journal, 2005
Information security management consists of identifying an organization's electronic informational assets, as well as the planning and programs that must be carried out to ensure its continued availability, confidentiality and integrity. Whether the organization is a commercial enterprise, governmental agency or educational institution, these…
Descriptors: Confidentiality, Integrity, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Davidson, Mary Ann – EDUCAUSE Review, 2005
Leadership in IT security is needed. Security matters: the ethics, the economics, and the social implications. There is much the academic community can do to help ensure cybersecurity. This document discusses steps academia can take to help ensure cybersecurity.
Descriptors: Internet, Computer Security, Ethics, Social Issues
Balas, Janet – Computers in Libraries, 2005
This article, written by a systems librarian at the Monroeville Public Library, discusses a major issue affecting all computer users, security. It indicates that while, staying up-to-date on the latest security issues has become essential for all computer users, it's more critical for network managers who are responsible for securing computer…
Descriptors: Public Libraries, Computers, Computer Security, Computer Software
Peer reviewed Peer reviewed
Direct linkDirect link
Williams, Tracy – CUPA-HR Journal, 2003
As institutions review and strengthen their plans to secure confidential data, what proactive role does the human resource professional play as a strategic partner? Why are employees a critical part of the solution? And how are they educated regarding their responsibilities with data security? Datatel's HR product manager shares some…
Descriptors: Human Resources, Colleges, Computer Security, Privacy
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2008
EDUCAUSE Core Data Service Fiscal Year 2007 Summary Report summarizes much of the data collected through the 2007 EDUCAUSE core data survey about campus information technology (IT) environments at 994 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Peer reviewed Peer reviewed
Direct linkDirect link
Teixeira, Claudio; Pinto, Joaquim Sousa; Martins, Joaquim Arnaldo – Campus-Wide Information Systems, 2008
Purpose: The aim of this paper is to describe a project to provide an online web portal that can be used as a front-end for all university users--students, teachers, staff--and services, library, administration, e-learning, and e-mail. Design/methodology/approach: The profile model proposed is mainly inheritable, defined by profile components with…
Descriptors: Information Systems, Profiles, Internet, Web Sites
Peer reviewed Peer reviewed
Direct linkDirect link
Bishop, Matt – Journal on Educational Resources in Computing, 2006
This article investigates teaching the application of technical ideas by non-technical means, especially by using puzzles to engage students. After discussing the need to teach students to evaluate contexts in which decisions about computer security must be made, we suggest questions and scenarios drawn from political science, history, as well as…
Descriptors: Political Science, Computer Security, Humanities, Context Effect
Peer reviewed Peer reviewed
Direct linkDirect link
Kabir, Md. H.; Shoja, Gholamali C.; Manning, Eric G. – Interactive Technology and Smart Education, 2006
Streaming audio/video contents over the Internet requires large network bandwidth and timely delivery of media data. A streaming session is generally long and also needs a large I/O bandwidth at the streaming server. A streaming server, however, has limited network and I/O bandwidth. For this reason, a streaming server alone cannot scale a…
Descriptors: Computer System Design, Intellectual Property, Internet, Simulation
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Pages: 1  |  ...  |  74  |  75  |  76  |  77  |  78  |  79  |  80  |  81  |  82  |  ...  |  106