Publication Date
| In 2026 | 0 |
| Since 2025 | 5 |
| Since 2022 (last 5 years) | 42 |
| Since 2017 (last 10 years) | 75 |
| Since 2007 (last 20 years) | 197 |
Descriptor
Source
Author
| Descy, Don E. | 3 |
| Panettieri, Joseph C. | 3 |
| Smith, Peter, Ed. | 3 |
| Alper Yayla | 2 |
| Botterman, Maarten | 2 |
| Cremonini, Leon | 2 |
| Cummings, Jeff | 2 |
| Ettedgui, Emile | 2 |
| Goldsborough, Reid | 2 |
| Graafland-Essers, Irma | 2 |
| Gunter, Glenda A. | 2 |
| More ▼ | |
Publication Type
Education Level
Location
| United Kingdom | 6 |
| United States | 6 |
| New York | 5 |
| California | 4 |
| Florida | 4 |
| North Carolina | 4 |
| Greece | 3 |
| Maryland | 3 |
| South Korea | 3 |
| Turkey | 3 |
| Arizona | 2 |
| More ▼ | |
Laws, Policies, & Programs
| Family Educational Rights and… | 2 |
| Digital Millennium Copyright… | 1 |
| Social Security | 1 |
Assessments and Surveys
| ACT Assessment | 1 |
| Program for International… | 1 |
What Works Clearinghouse Rating
Hyde, Hartley – Australian Mathematics Teacher, 2007
The transfer of data from one part of a computer to another has always been a complex task in which speed is traded against accuracy and the time required for error correction. Much more complex therefore is the transfer of information from one machine to another of a different type. Difficulties arise when machines are updated, when file formats…
Descriptors: Computer Software, Internet, Information Transfer, Information Systems
Yuan, Xiaohong; Vega, Percy; Qadah, Yaseen; Archer, Ricky; Yu, Huiming; Xu, Jinsheng – ACM Transactions on Computing Education, 2010
Using animated visualization tools has been an important teaching approach in computer science education. We have developed three visualization and animation tools that demonstrate various information security concepts and actively engage learners. The information security concepts illustrated include: packet sniffer and related computer network…
Descriptors: Computer Science Education, Visualization, Teaching Methods, Undergraduate Study
Peer reviewedAntonopoulos, Nick; Koukoumpetsos, Kyriakos; Shafarenko, Alex – Internet Research, 2001
Discusses the mobile software agent paradigm that provides a foundation for the development of high performance distributed applications and presents a simple, distributed access control architecture based on the concept of distributed, active authorization entities (lock cells), any combination of which can be referenced by an agent to provide…
Descriptors: Computer Security, Computer Software
McCarthy, Rob – Technology & Learning, 2005
In the last year, a series of viruses and worms that caused damage across the Internet in record time has made very clear how vulnerable computer systems are. The MS Blaster, Slammer, Sasser, and Korgo.W worms have shown that signature-based antivirus software and traditional firewalls are not enough to protect networks. Everyone is worried about…
Descriptors: Computer Software, Computer Security
Panettieri, Joseph C. – Campus Technology, 2007
Imagine showing cops and robbers the blueprints to the campus. Then, letting them keep the detailed blueprints to review--over and over again--at their leisure. The robbers would memorize every nuance of the campus layout, and at some point, they'd likely plan a break-in. But on the flip side, the cops would identify security weaknesses--and help…
Descriptors: Campuses, Computer Software, Participative Decision Making, Computer Security
Englund, Lillian White – Intervention in School and Clinic, 2009
This article discusses the development and use of an on-line portfolio process. It presents a background rationale for the need and effectiveness of a communication tool that supports the use of the portfolio process throughout the education of a child with identified disabilities. The process for developing the individualized Web page is…
Descriptors: Portfolios (Background Materials), Portfolio Assessment, Access to Information, Web Sites
Peer reviewedMartin, Kelly – T.H.E. Journal, 2004
It used to be that Internet threats were aimed at disabling their targets. The most common payload of yesterday's viruses, worms and other malicious code either caused system instability or, perhaps, deleted certain files. In many cases, these threats announced their arrival by flashing messages on the computer screen or causing some other…
Descriptors: Computer Security, Computer Software, Privacy, Internet
Johnson, Doug – Jossey-Bass, An Imprint of Wiley, 2012
This is a must-have resource for all K-12 teachers and administrators who want to really make the best use of available technologies. Written by Doug Johnson, an expert in educational technology, "The Classroom Teacher's Technology Survival Guide" is replete with practical tips teachers can easily use to engage their students and make their…
Descriptors: Educational Strategies, Elementary Secondary Education, Educational Technology, Technology Integration
Buck, Stephanie – Computers in Libraries, 2009
As news outlets create headlines such as "A Cloud & A Prayer," "The Cloud Is the Computer," and "Leveraging Clouds to Make You More Efficient," many readers have been left with cloud confusion. Many definitions exist for cloud computing, and a uniform definition is hard to find. In its most basic form, cloud…
Descriptors: Computers, Libraries, Information Technology, Information Scientists
Descy, Don E. – TechTrends: Linking Research and Practice to Improve Learning, 2007
Just as many people log onto a Web mail site (Gmail, Yahoo, MSN, etc.) to read, write and store their email, there are Web sites out there with word processing, database, and a myriad of other software applications that are not downloadable but used on the site through a Web browser. The user does not have to download the applications to a…
Descriptors: Computer Software, Internet, Online Searching, Web Sites
Schneider, Karen G. – Library Journal, 2007
Over the next several decades, libraries will face the potential loss of all the e-journals, ebooks, electronic theses, local digital collections, and other "e-stuff" curated for the public good. A solution to this problem is LOCKSS ("Lots of Copies Keep Stuff Safe"), a free, open-source digital-preservation software from Stanford University that…
Descriptors: Computer Software, Libraries, Library Networks, Library Services
Peer reviewedLambert, Joyce C.; Lousteau, Carolyn L.; Mochetta, Page T. – T.H.E. Journal, 2001
Discusses the security of computerized test files based on a survey of collegiate educators and offers recommendations to make tests more secure. Highlights include passwords; firewalls; keeping test files offline rather than on a hard drive; encryption; and using software to write over files rather than just deleting them. (LRW)
Descriptors: Computer Security, Computer Software, Higher Education, Surveys
Brown, Scott – T.H.E. Journal, 2005
In this article, the author explains how antivirus programs work. He also explains how performances of various antivirus programs vary from one to another. He also takes a look at 13 antivirus programs and explains which of these will keep computers protected. These programs include: (1) Sophos Anti-Virus Version 3.86.2; (2) McAfee VirusScan 9.0;…
Descriptors: Computer Security, Crime Prevention, Vandalism, Computer Software
Fryer, Wesley A. – Technology & Learning, 2005
For schools, spam is not only an annoyance and a time waster; it clogs district mail servers, consumes valuable network bandwidth, and can deliver and propagate a variety of malware programs that can wreak havoc on their system. A district strategy to "can the spam," therefore, must be multifaceted and address security vulnerabilities at different…
Descriptors: Computer Security, Electronic Mail, Computer Software, Training
Gunter, Glenda A. – MultiMedia Schools, 1997
Discusses computer viruses and explains how to detect them; discusses virus protection and the need to update antivirus software; and offers 10 safe computing tips, including scanning floppy disks and commercial software, how to safely download files from the Internet, avoiding pirated software copies, and backing up files. (LRW)
Descriptors: Computer Security, Computer Software, Downloading, Floppy Disks

Direct link
