Publication Date
| In 2026 | 0 |
| Since 2025 | 1 |
| Since 2022 (last 5 years) | 11 |
| Since 2017 (last 10 years) | 33 |
| Since 2007 (last 20 years) | 133 |
Descriptor
Source
Author
| Nickerson, Gord | 6 |
| Breeding, Marshall | 4 |
| Descy, Don E. | 4 |
| Eastman, Skip | 3 |
| Green, Kenneth C. | 3 |
| Harris, Judi | 3 |
| Machovec, George S. | 3 |
| Basch, Reva | 2 |
| Behrens, John T. | 2 |
| Coffman, Steve | 2 |
| Duin, Ann Hill | 2 |
| More ▼ | |
Publication Type
Education Level
Audience
| Practitioners | 65 |
| Teachers | 28 |
| Administrators | 22 |
| Policymakers | 15 |
| Students | 6 |
| Media Staff | 5 |
| Researchers | 5 |
| Parents | 4 |
| Community | 1 |
| Counselors | 1 |
Location
| Australia | 7 |
| Canada | 7 |
| Spain | 7 |
| United States | 7 |
| United Kingdom | 6 |
| Florida | 4 |
| Pennsylvania | 4 |
| South Africa | 4 |
| United Kingdom (England) | 4 |
| Arizona | 3 |
| California | 3 |
| More ▼ | |
Laws, Policies, & Programs
| Americans with Disabilities… | 1 |
| Family Educational Rights and… | 1 |
Assessments and Surveys
| Fast Response Survey System | 1 |
| Program for International… | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Hedberg, John G.; Brudvik, Ole C. – Theory Into Practice, 2008
Technology-dependent teaching strategies can exploit the currently underused capacities of media-rich Web 2.0 technology to enable student engagement and support higher order thinking. In particular, Web 2.0 technologies support learners' opportunities to coconstruct ideas/knowledge and ways in which they can add their own interpretations in to…
Descriptors: Teaching Methods, Internet, Computer Software, Computer Mediated Communication
Wack, John P.; Carnahan, Lisa J. – 1989
This document contains guidance for managing the threats of computer viruses, Trojan horses, network worms, etc. and related software along with unauthorized use. It is geared towards managers of end-user groups, managers dealing with multi-user systems, personal computers, and networks. The guidance is general and addresses the vulnerabilities…
Descriptors: Computer Networks, Computer Software, Contingency Management, Guidelines
King, Kenneth M. – EDUCOM Bulletin, 1988
Discussion of the recent computer virus attacks on computers with vulnerable operating systems focuses on the values of educational computer networks. The need for computer security procedures is emphasized, and the ethical use of computer hardware and software is discussed. (LRW)
Descriptors: Computer Networks, Computer Software, Computer Uses in Education, Ethics
Machovec, George S. – Online Libraries and Microcomputers, 1994
Describes Mosaic, an Internet resource locator and navigation tool developed at the University of Illinois' National Center for Super-Computing Applications (NCSA). Topics discussed include the relationship with the World Wide Web; flexibility; obtaining Mosaic client software; and file transfer protocol instructions. (Contains seven references.)…
Descriptors: Computer Networks, Computer Software, File Transfer Protocol, Information Networks
Peer reviewedHatfield, Thomas H. – Journal of Environmental Health, 1995
This article has three objectives: (1) introduce the basics of the World Wide Web (including Internet connectivity, hypertext, and uniform resource locators); (2) highlight environmental health databases on the Web; and (3) discuss possible applications of the Web for the environmental health profession. (LZ)
Descriptors: Computer Networks, Computer Software, Databases, Educational Resources
Nickerson, Gord – Computers in Libraries, 1992
Discussion of computer-mediated communication focuses on the development of the BITNET computer network. The use of BITNET for interactive messaging, batch file transfer, and electronic mail is described; server programs are explained; and possible future developments of BITNET are discussed. (seven references) (LRW)
Descriptors: Computer Networks, Computer Software, Electronic Mail, Futures (of Society)
Peer reviewedFalk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Miller, Steven E.; Seiberling, Chris – Technology & Learning, 2004
This article represents the second part of a series in this journal called "How to Perform a Security Audit." It continues the conversation on setting up a process for identifying security-related concerns and implementation safeguards. It continues the conversation from the perspective of system monitoring. This article discusses how to use a…
Descriptors: Computer Security, Systems Analysis, Troubleshooting, Computer Networks
Liu, Yipeng – ProQuest LLC, 2009
Network externalities or alternatively termed network effects are pervasive in computer software markets. While software vendors consider pricing strategies, they must also take into account the impact of network externalities on their sales. My main interest in this research is to describe a firm's strategies and behaviors in the presence of…
Descriptors: Information Technology, Competition, Computer Software, Cost Effectiveness
Matoria, Ram Kumar; Upadhyay, P. K.; Moni, Madaswamy – Program: Electronic Library and Information Systems, 2007
Purpose: To describe the development of the library management system, e-Granthalaya, for public libraries in India. This is an initiative of the Indian government's National Informatics Centre (NIC). The paper outlines the challenges and the potential of a full-scale deployment of this software at a national level. Design/methodology/approach:…
Descriptors: Public Libraries, Library Automation, Foreign Countries, Computer Networks
Technology & Learning, 2008
Anytime, anywhere, learning provides opportunities to create digital learning environments for new teaching styles and personalized learning. As part of making sure the program is effective, the safety and security of students and assets are essential--and mandated by law. The Children's Internet Protection Act (CIPA) addresses Internet content…
Descriptors: Internet, Safety, Federal Legislation, Computer Networks
Moore, Jack – Exceptional Parent, 1988
The article describes the IBM/Special Needs Exchange which consists of: (1) electronic mail, conferencing, and a library of text and program files on the CompuServe Information Service; and (2) a dial-in database of special education software for IBM and compatible computers. (DB)
Descriptors: Computer Networks, Computer Software, Disabilities, Electronic Mail
Peters, Paul Evan – EDUCOM Review, 1994
Considers issues involving intellectual property rights on information networks. The need for the Internet and the National Information Infrastructure to support both commercial and noncommercial providers of information is discussed; and intellectual property management as services available to information providers rather than as features of the…
Descriptors: Computer Networks, Computer Software, Information Networks, Intellectual Property
Machovec, George S. – Online Libraries and Microcomputers, 1993
Describes the World Wide Web (WWW), a navigational tool to organize information on the Internet into a set of hypertext documents. Hypertext is explained; relationships between WWW, Gopher, and Wide Area Information Servers (WAIS) are discussed; and future possibilities are considered. (Contains three references.) (LRW)
Descriptors: Computer Networks, Computer Software, Futures (of Society), Hypermedia
Crockett, Henry; Morrison, Ronald – Proceedings of the ASIS Annual Meeting, 1994
Discusses research with neural networks in the area of finance. Highlights include bond pricing, theoretical exposition of primary bond pricing, bond pricing regression model, and an example that created networks with corporate bonds and NeuralWare Neuralworks Professional H software using the back-propagation technique. (LRW)
Descriptors: Computer Networks, Computer Software, Corporations, Models

Direct link
