Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 2 |
| Since 2017 (last 10 years) | 8 |
| Since 2007 (last 20 years) | 41 |
Descriptor
Source
Author
Publication Type
Education Level
| Higher Education | 17 |
| Postsecondary Education | 9 |
| Elementary Secondary Education | 4 |
| Adult Education | 3 |
| Two Year Colleges | 2 |
| Middle Schools | 1 |
| Secondary Education | 1 |
Audience
| Practitioners | 37 |
| Administrators | 19 |
| Media Staff | 16 |
| Policymakers | 9 |
| Teachers | 6 |
| Students | 4 |
| Parents | 3 |
| Researchers | 2 |
Location
| United States | 15 |
| Canada | 13 |
| United Kingdom | 9 |
| Australia | 7 |
| Ohio | 6 |
| Florida | 5 |
| New York | 5 |
| Pennsylvania | 5 |
| Arizona | 4 |
| California | 4 |
| Colorado | 4 |
| More ▼ | |
Laws, Policies, & Programs
| Equal Access | 4 |
| Americans with Disabilities… | 2 |
| First Amendment | 2 |
| Goals 2000 | 2 |
| Family Educational Rights and… | 1 |
| Freedom of Information Act | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Srinivasan, Satish Mahadevan – ProQuest LLC, 2010
Data Aggregation (DA) is a set of functions that provide components of a distributed system access to global information for purposes of network management and user services. With the diverse new capabilities that networks can provide, applicability of DA is growing. DA is useful in dealing with multi-value domain information and often requires…
Descriptors: Data, Computer Networks, Computer Security, Access to Information
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
Misra, P. K. – Educational Media International, 2012
The changing landscape of learning is helping Asian countries to emerge as technology-driven knowledge-based societies. The success of these societies depends on promoting the acquisition of key competences and broadening opportunities for innovative and more flexible forms of learning for every citizen. Considering that in Asia almost everyone…
Descriptors: Lifelong Learning, Foreign Countries, Internet, Handheld Devices
Chetty, Marshini – ProQuest LLC, 2011
Technological infrastructure is often taken for granted in our day to day lives until it breaks down, usually because it invisibly supports tasks otherwise. Previous work in HCI has focused on how people react and deal with breaks in infrastructure as well as how to help people to fix or exploit these breaks. However, few have sought to understand…
Descriptors: Computer Networks, Physical Environment, Family Environment, Computer System Design
Foley, Marianne – Journal of Electronic Resources Librarianship, 2012
The absence of a well-defined space for library resources within course-management systems has been well documented in library literature. Academic libraries have sought to remedy this deficiency in numerous ways. This article describes how a "library nugget," or module, was added to the Buffalo State College course-management system,…
Descriptors: Academic Libraries, Management Systems, State Colleges, Library Services
Mitchell, Erik T. – Journal of Web Librarianship, 2010
One of the first big shifts in how libraries manage resources was the move from print-journal purchasing models to database-subscription and electronic-journal purchasing models. Libraries found that this transition helped them scale their resources and provide better service just by thinking a bit differently about their services. Likewise,…
Descriptors: Libraries, Library Materials, Electronic Publishing, Electronic Libraries
Howe, Grant – School Business Affairs, 2009
With money tight, more and more districts are considering remote access as a way to reduce expenses and budget information technology costs more effectively. Remote access allows staff members to work with a hosted software application from any school campus without being tied to a specific physical location. Each school can access critical…
Descriptors: Management Systems, Information Technology, Internet, Costs
Huang, Kuo Hung, Ed. – InTech, 2011
Digital library is commonly seen as a type of information retrieval system which stores and accesses digital content remotely via computer networks. However, the vision of digital libraries is not limited to technology or management, but user experience. This book is an attempt to share the practical experiences of solutions to the operation of…
Descriptors: Computer Networks, Publishing Industry, Electronic Libraries, Educational Resources
Platt, Richard G.; Carper, William B.; McCool, Michael – Journal of Information Systems Education, 2010
In early 2004, the Hilton Hotels Corporation (HHC) required that all of its hotels (both owned and franchised) install high-speed Internet access (HSIA) in all of their rooms by June 2004. This case focuses on how one of its franchise properties located on the northern gulf coast of Florida (the Hilton Sandestin Beach Golf Resort &…
Descriptors: Information Technology, Internet, Case Studies, Access to Information
Villano, Matt – Campus Technology, 2010
If a school is seeking to incorporate more collaborative approaches to teaching and learning, the design of the learning environment--whether it's a classroom or a more informal space--can be a critical factor in making this transformative move. Technology, in particular, can play a pivotal role in enabling students to work effectively in teams…
Descriptors: Cooperative Learning, Teacher Collaboration, Educational Facilities Improvement, Educational Facilities Planning
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Gkatzidou, Stavroula; Pearson, Elaine – Australasian Journal of Educational Technology, 2009
With the rapid development of wireless networks and mobile technologies and the increasing adoption of mobile learning, the need for "anywhere, anytime and any device" access to information becomes more evident. This has influenced the design of learning objects. The small but developing literature on vodcasting indicates its potential…
Descriptors: Access to Information, Program Effectiveness, Educational Technology, Telecommunications
Everhart, Nancy; Mardis, Marcia; Johnston, Melissa; Smith, Daniella – Online Submission, 2009
For Americans to engage in a global information society, it is critical that they have access to high-speed, high-bandwidth Internet, meaning broadband. Network connectivity opens up a wealth of possibilities to K-12 educators. While it has the potential to result in fundamental changes in teaching methods, it can definitely be used to enhance…
Descriptors: Educational Opportunities, Internet, Access to Information, Computer Networks
Kracke, Nancy – Journal of School Public Relations, 2009
It is tempting to assume that we know what our parents, our community, and our employees want from our schools. It is comforting to think that we know what they support. It is also dangerous. This article encourages school systems to let go of assumptions and to start asking the important questions that will lead school boards and administrators…
Descriptors: Central Office Administrators, School Districts, Information Sources, Stakeholders
Cervone, Frank – Computers in Libraries, 2005
This article discusses network security for libraries. It indicates that there were only six exploit (security exposure) problems, worldwide, reported to the CERT Coordination Center back in 1988. In that year, the CERT had just been established to provide a clearinghouse for exchanging information about network security problems. By 2003, the…
Descriptors: Computer Security, Libraries, Computer Networks, Access to Information

Direct link
Peer reviewed
