NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,216 to 1,230 of 1,596 results Save | Export
Neray, Phil – Online Libraries and Microcomputers, 1997
Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…
Descriptors: Computer Networks, Computer Security, Computer Software, Corporations
Peer reviewed Peer reviewed
Lester, Dan – Library Computing, 1999
An experienced library technology manager relates what happened in the wake of a serious library computer virus attack, which he accidentally unleashed. The narrative describes the combination of coincidences, mistakes, assumptions, and delays that caused the incident, and outlines the 10 key lessons learned. (AEF)
Descriptors: Computer Security, Electronic Mail, Library Equipment, Library Networks
Peer reviewed Peer reviewed
Ricart, Glenn – EDUCAUSE Review, 2000
Discusses the impact of the Internet, particularly on higher education. Highlights include a history of the development of the Internet; a leadership plan for higher education; authentication of personal identity; security; information quality; the concept of Internet time; and future possibilities. (LRW)
Descriptors: Computer Security, Futures (of Society), Higher Education, Internet
Peer reviewed Peer reviewed
Aldridge, Alicia; White, Michele; Forcht, Karen – Internet Research, 1997
Lack of security is perceived as a major roadblock to doing business online. This article examines system, user, and commercial transaction privacy on the World Wide Web and discusses methods of protection: operating systems security, file and data protection, user education, access restrictions, data authentication, perimeter and transaction…
Descriptors: Access to Information, Business, Computer Security, Government Role
Foster, Andrea L. – Chronicle of Higher Education, 2001
Describes how as colleges keep more information about students in electronic records, institutions struggle for ways to make sure only the right people gain access. (EV)
Descriptors: Computer Security, Confidential Records, Disclosure, Information Policy
Peer reviewed Peer reviewed
Samoriski, Jan H.; And Others – Journal of Broadcasting & Electronic Media, 1996
Attempts to clarify the status of e-mail privacy under the Electronic Communications Privacy Act of 1986 (ECPA). Examines current law and the paucity of definitive case law. A review of cases and literature suggests there is a gap in the existing ECPA that allows for potentially abusive electronic monitoring and interception of e-mail,…
Descriptors: Computer Security, Electronic Mail, Information Policy, Laws
Fleischman, John – Converge, 2002
Discusses wireless local area networks (LANs) which typically consist of laptop computers that connect to fixed access points via infrared or radio signals. Topics include wide area networks; personal area networks; problems, including limitations of available bandwidth, interference, and security concerns; use in education; interoperability;…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer Security, Cost Effectiveness
Mills, Lane B. – School Administrator, 2005
Lane Mills, assistant superintendent for accountability and technology for Wilson County Schools, in North Carolina, describes the process of reviewing and updating technology policies in her home school district. While technology policies and procedures should be tailored to each district's needs and level of technology use, some basic policies…
Descriptors: Educational Technology, School Districts, Web Sites, Educational Policy
Peer reviewed Peer reviewed
Sousa, Kenneth J.; MacDonald, Laurie E.; Fougere, Kenneth T. – Journal of Education for Business, 2005
The authors conducted an evaluation of Management Information Systems (MIS) textbooks and found that computer security receives very little in-depth coverage. The textbooks provide, at best, superficial treatment of security issues. The research results suggest that MIS faculty need to provide material to supplement the textbook to provide…
Descriptors: Textbooks, Management Information Systems, Computer Security, Textbook Evaluation
Peer reviewed Peer reviewed
Direct linkDirect link
Cerf, Vinton G. – EDUCAUSE Review, 2004
In t his article, the author discusses the role of higher education research and development (R&D)--particularly R&D into the issues and problems that industry is less able to explore. In addition to high-speed computer communication, broadband networking efforts, and the use of fiber, a rich service environment is equally important and is…
Descriptors: Internet, Higher Education, Research and Development, Telecommunications
Riley, Sheila – Technology & Learning, 2007
It is not always easy to find the balance between protecting students from Internet dangers and distractions and reaping its benefits--but it is certainly on every district's tech priority list. Sharnell Jackson, chief e-learning officer for the 415,000-student Chicago Public Schools, and Miguel Guhlin, director of instructional technology…
Descriptors: Computer Security, School Safety, Computer Mediated Communication, Parent Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yi, Qing; Zhang, Jinming; Chang, Hua-Hua – ETS Research Report Series, 2006
Chang and Zhang (2002, 2003) proposed several baseline criteria for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria were obtained from theoretical derivations that assumed uniformly randomized item selection. The current study investigated potential damage caused…
Descriptors: Computer Assisted Testing, Adaptive Testing, Test Items, Computer Security
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Pages: 1  |  ...  |  78  |  79  |  80  |  81  |  82  |  83  |  84  |  85  |  86  |  ...  |  107