Publication Date
In 2025 | 8 |
Since 2024 | 61 |
Since 2021 (last 5 years) | 109 |
Since 2016 (last 10 years) | 232 |
Since 2006 (last 20 years) | 807 |
Descriptor
Source
Author
Publication Type
Education Level
Audience
Practitioners | 400 |
Teachers | 174 |
Administrators | 148 |
Policymakers | 90 |
Media Staff | 56 |
Researchers | 54 |
Students | 24 |
Parents | 12 |
Community | 5 |
Counselors | 2 |
Location
Canada | 95 |
United States | 80 |
United Kingdom | 59 |
Australia | 47 |
California | 38 |
Texas | 33 |
Japan | 30 |
New York | 30 |
Florida | 25 |
Pennsylvania | 25 |
Finland | 22 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Does not meet standards | 1 |
Stamps, David – Training, 1997
Information technology is not enough without knowledge management. People who oversee and support knowledge management are essential. The move to knowledge management systems may eclipse training and development unless trainers help people learn about learning and about sharing their knowledge. (JOW)
Descriptors: Adult Education, Computer Networks, Information Technology, Organizational Development
Wodarz, Nan – School Business Affairs, 1997
The data contained on desktop computer systems and networks pose security issues for virtually every district. Sensitive information can be protected by educating users, altering the physical layout, using password protection, designating access levels, backing up data, reformatting floppy disks, using antivirus software, and installing encryption…
Descriptors: Computer Networks, Computer Security, Elementary Secondary Education, Internet
Nilsson, Fredrik – American School & University, 2002
Discusses affordable and practical security solutions, such as networked video systems, that are available to meet schools' needs for highly functional, low-cost surveillance. (EV)
Descriptors: Computer Networks, Crime Prevention, School Safety, Schools
King, Kenneth M. – EDUCOM Bulletin, 1988
Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)
Descriptors: Computer Networks, Computer Software, Computer Uses in Education, Ethics

Bechar-Israeli, Haya – Journal of Computer-Mediated Communication, 1995
Examines nicknames of Internet Relay Chat (IRC) users, whose identities are condensed into a single line which states their nicknames, the electronic address, and a slogan or the users' real names. Demonstrates that although people play games with their nicknames, the nicknames they choose are an inherent part of their Net identity and their…
Descriptors: Computer Mediated Communication, Computer Networks, Higher Education, Identification (Psychology)
Machovec, George S. – Online Libraries and Microcomputers, 1994
Describes Mosaic, an Internet resource locator and navigation tool developed at the University of Illinois' National Center for Super-Computing Applications (NCSA). Topics discussed include the relationship with the World Wide Web; flexibility; obtaining Mosaic client software; and file transfer protocol instructions. (Contains seven references.)…
Descriptors: Computer Networks, Computer Software, File Transfer Protocol, Information Networks

van Brakel, Pieter A.; And Others – Electronic Library, 1995
Provides guidelines for home page design, and suggests that the physical appearance of a home page is similar to that of a good graphical user interface. In designing a complete home page file, the premise is that basic hypertext design principles could also be applied in the World Wide Web environment. (Author/JKP)
Descriptors: Computer Graphics, Computer Networks, Guidelines, Hypermedia

Hatfield, Thomas H. – Journal of Environmental Health, 1995
This article has three objectives: (1) introduce the basics of the World Wide Web (including Internet connectivity, hypertext, and uniform resource locators); (2) highlight environmental health databases on the Web; and (3) discuss possible applications of the Web for the environmental health profession. (LZ)
Descriptors: Computer Networks, Computer Software, Databases, Educational Resources

Lowry, Charles B. – Library Hi Tech, 1995
Discusses how information technology and information retrieval may be used to build the virtual library, based on examples from Carnegie-Mellon University. Topics include information technology infrastructure, including distributed computing; Boolean searching; natural language processing; navigating the Internet; and prototypes and problems at…
Descriptors: Computer Networks, Higher Education, Information Retrieval, Information Technology

Taylor, Janet H.; Ryan, Joe – Internet Research, 1995
Discussion of museums that take advantage of the Internet's format options for electronic presentation. Provides a list of 248 museums and galleries around the world that are making use of World Wide Web or Gopher servers, lists 4 recent pertinent articles, and lists 8 online directories. (Author/LRW)
Descriptors: Arts Centers, Computer Networks, Information Sources, Museums

Alm, Andy – Convergence, 1992
Describes computer networks and conferences dedicated to environmental education and activism. Gives the electronic and surface mail addresses of contacts for the Association for Progressive Communications in 12 countries. (SK)
Descriptors: Computer Networks, Electronic Mail, Environmental Education, Organizations (Groups)
Henry, Charles – Wilson Library Bulletin, 1993
Analyzes metaphors currently being used to describe the NREN (National Research and Education Network) and concludes that they largely ignore the true cognitive implications of the network. Topics addressed include stated goals of the NREN; educational and economic factors influencing the NREN; and the transformational potential of the NREN for…
Descriptors: Computer Networks, Economic Factors, Educational Trends, Information Networks
Nickerson, Gord – Computers in Libraries, 1992
Discussion of computer-mediated communication focuses on the development of the BITNET computer network. The use of BITNET for interactive messaging, batch file transfer, and electronic mail is described; server programs are explained; and possible future developments of BITNET are discussed. (seven references) (LRW)
Descriptors: Computer Networks, Computer Software, Electronic Mail, Futures (of Society)
Sparks, Susan M. – Nursing and Health Care, 1994
Discusses E.T.Net, an online computer conferencing network that links developers and users of interactive technology in health science education. Describes the individual conferences including those for nursing care, computer-assisted instruction, hardware, and shareware. Provides information about accessing the network. (JOW)
Descriptors: Allied Health Occupations Education, Computer Networks, Tables (Data), Teleconferencing

Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers