Publication Date
In 2025 | 25 |
Since 2024 | 163 |
Since 2021 (last 5 years) | 423 |
Since 2016 (last 10 years) | 647 |
Since 2006 (last 20 years) | 1225 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This September 24, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Thank You, Masked Man" (Reilly, Liam); (2) "The Trailing-Spouse…
Descriptors: Higher Education, Biological Sciences, Scholarship, College Faculty
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Cunningham, Alisa F.; Milam, John – National Center for Education Statistics, 2005
This report examines the feasibility of implementing a student unit record system to replace the student-related components that currently are based on aggregate institution-level data collected as part of the Integrated Postsecondary Education Data System (IPEDS). The feasibility study was initiated by the National Center for Education Statistics…
Descriptors: Feasibility Studies, Student Records, Evaluation Methods, Technology Integration
Anderson, Laura Challman; Lotspiech, Jeffrey B. – Bulletin of the American Society for Information Science, 1995
Discusses collaborative efforts by the Institute for Scientific Information (ISI) and the IBM Digital Library Group in creating techniques to ensure information integrity, journal article authenticity, user confidentiality, management of copyright, and general security in electronic libraries. Also describes the rights management and security…
Descriptors: Access to Information, Computer Security, Computer System Design, Confidentiality

Duggan, Brian – TechTrends, 1994
Explores design considerations for a functional microcomputer lab, including ergonomics and furnishings; access for the disabled; the use of other media; hardware security; and software security, including virus protection. A summary paragraph comments on the role of planning and forecasting. A bibliography of eight titles for further reading is…
Descriptors: Accessibility (for Disabled), Audio Equipment, Computer Centers, Computer Security

Dawes, Sharon S.; Pardo, Theresa A.; DiCaterino, Ann – Journal of the American Society for Information Science, 1999
Two Internet testbeds conducted at the New York State Center for Technology in Government (CTG) identified five threshold factors that shape a government agency's ability to initiate Web-based services: technical infrastructure, user capabilities, information content, cost, and security. Six kinds of benefits of the Web to deliver government…
Descriptors: Computer Security, Costs, Federal Government, Federal Programs

Soh, Christina; Mah, Quee Yong; Gan, Fong Jek; Chew, Daniel; Reid, Edna – Internet Research, 1997
A survey of Singapore-based firms in computer/information technology, hospitality, manufacturing, retail, travel, publishing, and banking/finance that use the Internet for business found that most of the respondents use the Internet for marketing and advertising, customer service and support, information gathering, and, to a lesser degree,…
Descriptors: Advertising, Banking, Business, Computer Security
Littman, Marlyn Kemper – Journal of Online Learning, 1998
Explores capabilities of extranets (collaborative information networks between partner institutions) from the perspective of the school and university environment. Introduces distinctive features. Presents strategies and techniques for facilitating the extranet design and implementation process and delineates tactics for safeguarding extranets…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design

Furnell, Steven; Evans, Mike; Bailey, Paul – Quarterly Review of Distance Education, 2000
Discusses benefits of online distance learning and considers some of the barriers that need to be addressed for successful implementation. Topics include quality compared to traditional face-to-face methods; academic workloads; self-pacing issues; the lecturer's role; lack of standards; security concerns; and the need for strategic planning. (LRW)
Descriptors: Computer Assisted Instruction, Computer Security, Conventional Instruction, Distance Education
Spicer, Donald Z.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2004
This year marks the fifth annual EDUCAUSE Current Issues Survey to identify what campus information technology leaders see as their most critical IT challenges. Thirty-five percent (571) of the 1,638 EDUCAUSE primary member representatives who were asked to participate responded to an e-mail invitation to complete the Web-based survey in December…
Descriptors: Information Technology, Human Resources, Leadership, Higher Education
Beasley, William; Dobda, Kathyanne W.; Wang, Lih-Ching Chen – International Journal of Instructional Media, 2005
In recent years laptop computers have become increasingly popular in educational settings; wireless connectivity is a more recent development which is only now being fully explored, and which has led to the creation of the "wireless laptop lab." In this article, the authors share some of the experiences and concerns that they have encountered…
Descriptors: Telecommunications, Computer Interfaces, Computer Uses in Education, Educational Technology
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Direct Marketing Association, Washington, DC. – 1997
The ability to meet people, visit places around the globe, and make purchases online has added a new dimension to teaching children about the opportunities and accompanying risks that exist in everyday life. The Direct Marketing Association has created this guide to information use, behavior, and privacy on the Internet to help parents supervise…
Descriptors: Computer Attitudes, Computer Security, Electronic Mail, Information Industry