Publication Date
In 2025 | 20 |
Since 2024 | 156 |
Since 2021 (last 5 years) | 416 |
Since 2016 (last 10 years) | 640 |
Since 2006 (last 20 years) | 1218 |
Descriptor
Source
Author
Villano, Matt | 9 |
Goldsborough, Reid | 8 |
DeBlois, Peter B. | 6 |
Descy, Don E. | 6 |
Marquardson, Jim | 6 |
Panettieri, Joseph C. | 6 |
Payne, Brian K. | 6 |
Foster, Andrea L. | 5 |
Smith, Peter, Ed. | 5 |
Waters, John K. | 5 |
Hawkins, Brian L. | 4 |
More ▼ |
Publication Type
Education Level
Audience
Teachers | 43 |
Administrators | 40 |
Practitioners | 30 |
Media Staff | 19 |
Policymakers | 17 |
Parents | 11 |
Students | 11 |
Support Staff | 3 |
Community | 2 |
Counselors | 1 |
Researchers | 1 |
More ▼ |
Location
United Kingdom | 29 |
United States | 28 |
Canada | 22 |
California | 21 |
Texas | 21 |
Turkey | 21 |
Australia | 18 |
Maryland | 16 |
Florida | 15 |
India | 15 |
North Carolina | 14 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
Program for International… | 2 |
ACT Assessment | 1 |
Big Five Inventory | 1 |
Rosenberg Self Esteem Scale | 1 |
Trends in International… | 1 |
What Works Clearinghouse Rating
Machovec, George S., Ed. – Online Libraries and Microcomputers, 1996
Examines issues surrounding the publication of electronic journals and describes publisher solutions to these issues. Topics include pricing, security, electronic page layout, copyright, backfile availability, and reliability and accessibility of data. Describes some electronic journal projects and lists electronic journal services available via…
Descriptors: Access to Information, Computer Security, Copyrights, Costs

Gulliford, Bradley – Library Trends, 1998
Describes changes in services of the United Technologies Corporation Information Network from a traditional library system to a virtual system of World Wide Web sites, a document-delivery unit, telephone and e-mail reference, and desktop technical support to provide remote access. Staff time, security, and licensing issues are addressed.…
Descriptors: Change, Computer Security, Corporate Libraries, Document Delivery
Prichard, Janet J.; MacDonald, Laurie E. – Journal of Information Technology Education, 2004
On September 11th, 2001 the United States experienced the largest terrorist attack in its history. This event caused many government agencies to review their security practices and procedures. It also has raised awareness of other avenues that terrorists might pursue to achieve their goals, including cyber terrorism. Cyber terrorism can be…
Descriptors: Terrorism, Textbooks, Computer Security, Public Agencies
Sandvig, J. Christopher – Campus-Wide Information Systems, 2004
The growth of the Internet has greatly increased the demand for server-side programming courses at colleges and universities. Students enrolled in such courses must be provided with server-based accounts that support the technologies that they are learning. The process of creating, managing and removing large numbers of student server accounts is…
Descriptors: Internet, Courseware, Computer System Design, Computer Software Reviews
Nikkel, Terry; Kutty, Ashwin – Computers in Libraries, 2004
Dalhousie is a medium-sized university, with about 15,000 FTE students, located in Halifax, Nova Scotia. It is one of Canada's oldest and most prestigious universities, yet, like many other public institutions, it frequently suffers from a lack of adequate funding to fulfill all the conflicting needs of the various faculties and departments. This…
Descriptors: Foreign Countries, Research Libraries, Internet, Library Services
Ng, Eugenia M. W., Ed. – Information Science Reference, 2010
With the advent of new technologies, more convenient and effective ways of learning are being adopted. However, despite the growing advancements there remains a lack of literature in applications of using these technology teaching approaches. This book offers in-depth analysis of new technologies in blended learning that promote creativity,…
Descriptors: Foreign Countries, Cross Cultural Studies, Action Research, Distance Education
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Shih, Timothy; Hung, Jason – Information Science Publishing, 2007
Future Directions in Distance Learning and Communication Technologies presents theoretical studies and practical solutions for engineers, educational professionals, and graduate students in the research areas of e-learning, distance education, and instructional design. This book provides readers with cutting-edge solutions and research directions…
Descriptors: Electronic Learning, Distance Education, Instructional Design, Privacy
Hope, Andrew – British Educational Research Journal, 2006
Internet access has recently been introduced into over 30,000 schools in the UK. While web provision has been heralded by some as an educational panacea, it is also recognised that there are dangers inherent in school Internet use. Adopting the cultural risk perspective, drawing upon a social-cultural analysis of Internet regulation and utilising…
Descriptors: Foreign Countries, Internet, At Risk Persons, Pornography
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Krunic, Tanja; Ruzic-Dimitrijevic, Ljiljana; Petrovic, Branka; Farkas, Robert – Journal of Information Technology Education, 2006
The Advanced Technical School from Novi Sad set up a completely new study group for web design in 2004. The main goals of the paper are to explain the steps that were taken in starting this group, and to present the educational program based on our own research through the organization of the group and course descriptions. Since there is a…
Descriptors: Investigations, Prior Learning, Course Descriptions, Internet
Snyder, Robin M. – 1995
This paper focuses on practical and cost-effective NetWare-specific approaches to information systems and computer security. A series of real world experiences is presented that illustrate fundamental information systems and security concepts. A NetWare network is a client-server network which uses a file server to share files while client…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software Evaluation
Carroll, Michael L.; Downs, W. Scott – 1996
Many organizations grapple with a glut of electronic information spawned by stockpiles of incompatible computers. This book offers solutions in information sharing and computer interaction. Rather than being about the Internet per se, it is about approaches that are characteristic of the Internet and the managerial and technical aspects of…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
Congress of the U.S., Washington, DC. Office of Technology Assessment. – 1994
The use of information networks for business and government is expanding enormously. Government use of networks features prominently in plans to make government more efficient, effective, and responsive. But the transformation brought about by the networking also raises new concerns for the security and privacy of networked information. This…
Descriptors: Access to Information, Computer Networks, Computer Security, Cryptography