NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,591 to 1,605 of 1,635 results Save | Export
Technology & Learning, 2005
In recent years, the widespread availability of networks and the flexibility of Web browsers have shifted the industry from a client-server model to a Web-based one. In the client-server model of computing, clients run applications locally, with the servers managing storage, printing functions, and network traffic. Because every client is…
Descriptors: Computers, Computer System Design, Internet, Computer Uses in Education
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology
Smith, Michael Clay; Fossey, Richard – 1995
This book discusses issues related to campus crime and offers administrators suggestions and checklists that can be used to evaluate current procedures and defuse potential problems. Chapters cover: (1) "The Campus: A Sanctuary?"; (2) "The Complexion of Campus Crime Today"; (3) "The Concept of Crime and the Shape of…
Descriptors: Computer Security, Crime Prevention, Due Process, Evidence (Legal)
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security
Marzo-Lazaro, J. L.; Verdu-Carbo, T.; Fabregat-Gesa, R. – 1998
This paper describes a solution to the user identification and tracking problem within an educational World Wide Web environment. The paper begins with an overview of the Teaching Support System project at the University of Girona (Spain); the main objective of the project is to create an integrated set of tools for teachers to use to create and…
Descriptors: Computer Interfaces, Computer Security, Computer Software Development, Computer System Design
Graafland-Essers, Irma; Cremonini, Leon; Ettedgui, Emile; Botterman, Maarten – RAND Corporation, 2003
This report presents the current understanding of the advancement of the Information Society within the European Union and countries that are up for accession in 2004, and is based on the SIBIS (Statistical Indicators Benchmarking the Information Society) surveys and analyses per SIBIS theme and country. The report is unique in its coherent and…
Descriptors: Information Technology, Foreign Countries, Technological Advancement, Measurement
Graafland-Essers, Irma; Cremonini, Leon; Ettedgui, Emile; Botterman, Maarten – RAND Corporation, 2003
This report presents the current understanding of the advancement of the Information Society within the European Union and countries that are up for accession in 2004, and is based on the SIBIS (Statistical Indicators Benchmarking the Information Society) surveys and analyses per SIBIS theme and country. The report is unique in its coherent and…
Descriptors: Information Technology, Foreign Countries, Technological Advancement, Measurement
Zirkle, Chris – 2001
The Internet offers trade and industrial (T&I) educators a wealth of readily available information for use as teaching aids, supplemental materials, and laboratory resources. These materials provide many distinct benefits; however, there are also several issues that must be addressed when using the Internet as an adjunct in teaching. These…
Descriptors: Access to Computers, Access to Information, Computer Security, Computer Uses in Education
Wright, Peter W. – 2000
Based on the author's presentation at the International Conference on Computer Based Learning in Science, this paper discuses some high profile areas of interest and concern in the educational use of information and communication technology (ICT). The paper is influenced partly by a series of nine government funded "Best Practices"…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Distance Education
Peer reviewed Peer reviewed
Direct linkDirect link
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software
Peer reviewed Peer reviewed
Lorenzen, Elizabeth A., Ed. – Reference Librarian, 1996
This volume's topics include librarian role and ethical issues in Internet searching, strategies for locating career resources on the Internet and World Wide Web, career information for "Generation X" and for alumni, collaboration between libraries and university career services, career information gophers, and electronic privacy and…
Descriptors: Career Information Systems, Career Planning, Computer Security, Cooperative Programs
Alberta Dept. of Education, Edmonton. – 1999
The information in this document is based on a study that Alberta Education commissioned on establishing technology systems that are responsive to the requirements of Alberta's Freedom of Information and Protection of Privacy Act (FOIPP). This document provides an overview of key issues and suggested strategies in the following areas: (1)…
Descriptors: Access to Information, Computer Security, Computer Uses in Education, Educational Administration
Suiter, Martha, Ed. – 1995
This set of proceedings assembles papers presented at the 1995 Council for Higher Education Computing Services (CHECS) conference, held at the New Mexico Military Institute in Roswell, New Mexico. CHECS members are higher education computing services organizations within the state of New Mexico. The main focus of the conference was the Internet…
Descriptors: Access to Information, Computer Mediated Communication, Computer Security, Computer Uses in Education
American Association of Community Colleges (NJ1), 2006
This publication includes 13 articles: (1) ATE [Advanced Technological Education] Attuned to Global Competition; (2) Materials Science Center Supplies Information on Often-Overlooked Field; (3) CSEC [Cyber Security Education Consortium] Builds Corps of Cyber Technicians; (4) KCTCS [Kentucky Community and Technical College System] Is U.S. Partner…
Descriptors: Technology Education, Technical Education, Community Colleges, Faculty Development
Pages: 1  |  ...  |  99  |  100  |  101  |  102  |  103  |  104  |  105  |  106  |  107  |  108  |  109