NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,471 to 1,485 of 1,585 results Save | Export
Garson, G. David – 1995
Computing involves social issues and political choices. Issues such as privacy, computer crime, gender inequity, disemployment, and electronic democracy versus "Big Brother" are addressed in the context of efforts to develop a national public policy for information technology. A broad range of research and case studies are examined in an…
Descriptors: Case Studies, Civil Liberties, Computer Security, Computers
Wallas, Philip – 1996
Trends in publishing, advances in technology and pressures on library budgets have combined to put libraries and publishers at odds with each other. Research libraries expect broad, easy access to electronic information, greater convenience and faster delivery but at reduced cost. Publishers are exploring new channels for distributing their…
Descriptors: Access to Information, Computer Security, Document Delivery, Electronic Publishing
Karmakar, Nitya L. – 2002
The Internet remains as a wonder for the 21st century and its growth is phenomenon. According to a recent survey, the online population is now about 500 million globally and if this trend continues, it should reach 700 million by the end of 2002. This exponential growth of the Internet has given rise to several security, privacy and ethical…
Descriptors: Computer Security, Ethics, Federal Government, Federal Legislation
Hawke, Constance S. – 2001
The purpose of this book is threefold: (1) to inform Internet users of the legal ramifications of their on-line activities; (2) to help administrators handle specific situations or complaints regarding Internet activity; and (3) to provide guidance for the formulation of acceptable computer use policies on campuses. The chapters are: chapter 1,…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Copyrights
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Colman, Sue – Australian Universities' Review, 1997
Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…
Descriptors: Access to Information, College Administration, Computer Security, Confidentiality
Peer reviewed Peer reviewed
Massie, Malcom – Orana, 1996
Scotch College (Adelaide, Australia) has networked 90% of its classrooms. This article describes the campus computer network and its hardware and configuration; World Wide Web problems and solution; a "mini Internet" of curriculum-specific materials gathered from the Web; student and faculty use; student and staff training; security;…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology
Freedman, Maurice J. – Library Journal, 1996
Committed to utilizing information technology, the Westchester Library System (New York) made the World Wide Web publicly accessible. Describes the planning, implementation, and management process; obstacles involving financing; establishing Internet connectivity; and vendor negotiations. Westchester hired a Web manager, created Internet use…
Descriptors: Access to Information, Computer Security, Financial Support, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson, Elaine A. – Community College Journal, 2002
Describes Bio-Link, the Advanced Technological Education (ATE) Center for Biotechnology established with funding from the National Science Foundation (NSF). Reports that Bio-Link, headquartered at City College of San Francisco, has created a national network and resource base for community colleges, industry, and others interested in biotechnology…
Descriptors: Biology, Biotechnology, Community Colleges, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Schmidt, Howard – Community College Journal, 2002
Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…
Descriptors: Community Colleges, Computer Security, Crime, Emergency Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Daly, Una – T.H.E. Journal, 2005
Various elementary schools and middle schools across the U.S. have purchased one or more mobile laboratories. Although the wireless labs have provided more classroom computing, teachers and technology aides still have mixed views about their cost-benefit ratio. This is because the proliferation of viruses and spyware has dramatically increased…
Descriptors: Elementary Schools, Middle Schools, Computers, Learning Laboratories
Peer reviewed Peer reviewed
Direct linkDirect link
Kruger, Robert – Social Studies, 2003
As computers become a larger part of the curriculum, educators everywhere are being asked to take a stand for cyber ethics, the right and wrong of computer and Internet use. Teachers cannot always depend on parents to instill cyber ethics. Parents may not know or follow the rules, either. Once students understand cyber ethics, they may have a…
Descriptors: Ethics, Middle School Students, Computer Security, Elementary School Students
Peer reviewed Peer reviewed
Direct linkDirect link
Bhagyavati – Journal on Educational Resources in Computing, 2006
Information assurance courses delivered in an online environment pose challenges to the development of meaningful hands-on exercises for students. This article presents techniques on furnishing laboratory exercises to online students and presents examples of assignments drawn from the author's experiences in teaching online courses for over three…
Descriptors: Assignments, Advanced Courses, Distance Education, Online Courses
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Dunn, Deborah – Association of Small Computer Users in Education (ASCUE), 2005
In a tight job market, IT professionals with database experience are likely to be in great demand. Companies need database personnel who can help improve access to and security of data. The events of September 11 have increased business' awareness of the need for database security, backup, and recovery procedures. It is our responsibility to…
Descriptors: Databases, Information Technology, Computer Security, Computer Literacy
Soete, George J., Comp.; Zimmerman, Glen, Comp. – 1999
This SPEC (Systems and Procedures Exchange Center) Kit and Flyer reports results of a survey conducted in January 1999 that examined how ARL (Association of Research Libraries) member libraries assure the safety and security of persons, library materials, physical facilities, furnishings, computer equipment, etc. Forty-five of the 122 ARL member…
Descriptors: Academic Libraries, Computer Security, Foreign Countries, Higher Education
Pages: 1  |  ...  |  95  |  96  |  97  |  98  |  99  |  100  |  101  |  102  |  103  |  ...  |  106