Descriptor
| Computer Security | 2 |
| Higher Education | 2 |
| Information Sources | 2 |
| Access to Information | 1 |
| College Students | 1 |
| Computer Selection | 1 |
| Computer Software Selection | 1 |
| Computer System Design | 1 |
| Computer Use | 1 |
| Computer Uses in Education | 1 |
| Computers | 1 |
| More ▼ | |
Source
| Library Hi Tech | 1 |
Publication Type
| Reports - Descriptive | 2 |
| Guides - Classroom - Learner | 1 |
| Journal Articles | 1 |
Education Level
Audience
| Media Staff | 1 |
| Practitioners | 1 |
| Students | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedCole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Kendall, Diane S.; Marsh, Merle – 2002
This booklet presents questions and answers on everything from how to find out what technology students will need for college to ideas for handling technology emergencies when they are there at college. Information and selected resources are provided under the following questions that head each section: "How do I find out what technology I should…
Descriptors: College Students, Computer Security, Computer Selection, Computer Software Selection


