Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 2 |
Descriptor
Source
| Library Hi Tech | 6 |
| T.H.E. Journal | 2 |
| Australian Universities'… | 1 |
| Computers in Libraries | 1 |
| Discourse: Studies in the… | 1 |
| European Journal of Education | 1 |
Author
| Bailey, Gerald D. | 1 |
| Breeding, Marshall | 1 |
| Breeding, Michael | 1 |
| Cole, Timothy W. | 1 |
| Colman, Sue | 1 |
| Fore, Julie A. | 1 |
| Garrison, William V. | 1 |
| Hope, Andrew | 1 |
| Kalle Grill | 1 |
| Karin Danielsson | 1 |
| Lavagnino, Merri Beth | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 12 |
| Reports - Descriptive | 10 |
| Opinion Papers | 1 |
| Reports - General | 1 |
| Reports - Research | 1 |
Education Level
| Secondary Education | 1 |
Audience
| Practitioners | 12 |
| Media Staff | 7 |
| Administrators | 1 |
| Policymakers | 1 |
Location
| Australia | 1 |
| United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Loïs Vanhée; Karin Danielsson; Lena Enqvist; Kalle Grill; Melania Borit – European Journal of Education, 2024
Whereas hackathons are widespread within and outside academia and have been argued to be a valid pedagogical method for teaching interdisciplinarity, no detailed frameworks or methods are available for conceptualizing and organizing educational hackathons, i.e., hackathons dedicated to best achieving pedagogic objectives. This paper is dedicated…
Descriptors: Interdisciplinary Approach, Learning Activities, Programming, Computer Security
Breeding, Marshall – Computers in Libraries, 2005
Many libraries are or soon will be offering Wi-Fi, also known as wireless networks. The largest perceived barriers to providing this service are concerns about security. The prime rule when deploying Wi-Fi is segregation, having a clear separation between a public wireless network and the rest of the library?s network. A number of devices can be…
Descriptors: Libraries, Internet, Computer Networks, Computer Security
Peer reviewedWalery, Darrell – T.H.E. Journal, 2005
This article provides a quick start guide to provide educators with the basic points to consider before installing a wireless network in the school. Since many school districts have already implemented wireless networks, there is a lot of information available online to assist in the process.
Descriptors: Telecommunications, Electronic Equipment, Computer Networks, Computer Security
Peer reviewedRibble, Mike S.; Bailey, Gerald D. – T.H.E. Journal, 2004
Over the last two years, it has become evident that a behavior pattern of misuse and abuse with respect to technology is beginning to emerge in society. This outbreak of technology misuse and abuse is documented in continual news coverage on TV, in newspapers and on the Internet--both inside and outside of schools. The endless list of misuse and…
Descriptors: Computer Security, Crime, Technology Education, Citizenship
Peer reviewedLavagnino, Merri Beth – Library Hi Tech, 1997
When the Committee on Institutional Cooperation (CIC), an academic consortium of 12 major teaching and research universities began implementing the Virtual Electronic Library, a Continuum of Security Needs list was created which outlines the security and authentication issues that must be addressed. The thirteen security items on the list are…
Descriptors: Academic Libraries, Computer Security, Consortia, Electronic Libraries
Peer reviewedFore, Julie A. – Library Hi Tech, 1997
Introduces concepts of server security and includes articles and sidebars of firsthand accounts of consequences of not devoting enough time to security measures. Outlines the following factors to consider when evaluating a server's risk potential: confidentiality/reproducibility of the data; complexity of the system; backup system and hardware…
Descriptors: Computer Networks, Computer Security, Computer System Design, Data
Peer reviewedBreeding, Michael – Library Hi Tech, 1997
Focuses on designing a library network to maximize security. Discusses UNIX and file servers; connectivity to campus, corporate networks and the Internet; separation of staff from public servers; controlling traffic; the threat of network sniffers; hubs that eliminate eavesdropping; dividing the network into subnets; Switched Ethernet;…
Descriptors: Computer Networks, Computer Security, Computer System Design, Internet
Peer reviewedMcClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases
Peer reviewedCole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Hope, Andrew – Discourse: Studies in the Cultural Politics of Education, 2007
Whilst the association of risk with schools is predominately a negative one, fostering images of potential dangers, this paper draws upon a socio-cultural counter-discourse to explore the perceived benefits of certain risk taking activities within educational establishments. Using research data on school Internet "misuse" it is argued…
Descriptors: Student Attitudes, Internet, Risk, Student Behavior
Peer reviewedRiddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Colman, Sue – Australian Universities' Review, 1997
Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…
Descriptors: Access to Information, College Administration, Computer Security, Confidentiality

Direct link
