NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,456 to 1,470 of 1,635 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Weippl, Edgar R.; Tjoa, A Min – Interactive Technology and Smart Education, 2005
Privacy is a requirement that has not received the required attention in most e-learning platforms. Based on the results of a survey we identified weaknesses of e-learning platforms and describe improvements we made in Moodle as a proof-of-concept.
Descriptors: Electronic Learning, Privacy, Improvement, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Spicer, Donald Z.; Deblois, Peter B. – EDUCAUSE Review, 2004
This article features the EDUCAUSE Current Issues Survey. Administered by the EDUCAUSE Current Issues Committee, whose members review and recommend the set of issues to be presented each year, the survey identifies the issues that leaders in higher education information technology see as their most critical IT challenges. The Top-Ten current IT…
Descriptors: Information Technology, Higher Education, Surveys, Financial Support
Peer reviewed Peer reviewed
Direct linkDirect link
Rothschild, Daniel; Rezmierski, Virginia – EDUCAUSE Quarterly, 2004
The Computer Incident Factor Analysis and Categorization (CIFAC) Project at the University of Michigan began in September 2003 with grants from EDUCAUSE and the National Science Foundation (NSF). The project's primary goal is to create a best-practices security framework for colleges and universities based on rigorous quantitative analysis of…
Descriptors: Computer Security, Colleges, Statistical Analysis, Literature Reviews
Peer reviewed Peer reviewed
Direct linkDirect link
Wolff, Bill – EDUCAUSE Quarterly, 2006
Anecdotal evidence existed about the many students who use their laptops and the wireless network in university common spaces, but little was known about how, where, and why students use laptops on campus, and less was known about students' awareness of university wireless network policies and security. This article discusses the results of a…
Descriptors: Telecommunications, Computer Networks, College Students, School Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Hope, Andrew – Discourse: Studies in the Cultural Politics of Education, 2007
Whilst the association of risk with schools is predominately a negative one, fostering images of potential dangers, this paper draws upon a socio-cultural counter-discourse to explore the perceived benefits of certain risk taking activities within educational establishments. Using research data on school Internet "misuse" it is argued…
Descriptors: Student Attitudes, Internet, Risk, Student Behavior
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2007
According to a January 2007 survey by the Pew Internet & American Life Project, 55 percent of teens (ages 12 to 17) report having created a personal profile online, and an equal number regularly use social networking sites such as MySpace or Facebook. Of those, 91 percent use the sites to stay in touch with friends they see frequently. With all…
Descriptors: Internet, Social Networks, Adolescents, Student Motivation
Martin, James; Samels, James E. – Chronicle of Higher Education, 2007
College and university presidents are increasingly called upon to make informed choices about technology. The rapidly shifting landscape makes it tough to keep up with change and innovation, let alone stay ahead of the curve. In this article, the authors discuss 10 trends to watch in campus technology. These trends are the following: (1) increased…
Descriptors: Educational Trends, Information Technology, Partnerships in Education, Proprietary Schools
Hare, Karen – ProQuest LLC, 2008
Implementation of information systems has lagged in many areas of clinical healthcare for a variety of reasons. Economics, data complexity and resistance are among the often quoted roadblocks. Research suggests that physicians play a major part in the adoption, use and diffusion of information technology (IT) in clinical settings. There are also…
Descriptors: Information Needs, Physicians, Information Systems, Information Technology
Connolly, Mary V. – 1997
The Internet is a network of networks, sharing the same protocol and linking universities, research communities, businesses, and individuals world wide. In this new global information infrastructure, all citizens need to understand the power and pitfalls of the technology in order to function as responsible members. This paper discusses issues…
Descriptors: Access to Information, Computer Networks, Computer Security, Copyrights
American Association of Community Colleges, 2006
Although homeland security has gained prominence as a national focus and investment, it is clear that much of the most effective preparation must begin at local, state, and regional levels. This report reveals that an astonishing number of community colleges offer degree and certificate programs for first responders--law enforcement officers,…
Descriptors: National Security, Community Colleges, Partnerships in Education, Crisis Management
Kendall, Diane S.; Marsh, Merle – 2002
This booklet presents questions and answers on everything from how to find out what technology students will need for college to ideas for handling technology emergencies when they are there at college. Information and selected resources are provided under the following questions that head each section: "How do I find out what technology I should…
Descriptors: College Students, Computer Security, Computer Selection, Computer Software Selection
Institute for Information Studies, Queenstown, MD. – 1999
This collection of commissioned papers provides a variety of perspectives on the impact of global information networks. The following articles are included: "The Promise of Global Networks: An Introduction" (Jorge Reina Schement); "Architecture and Expectations: Networks of the World--Unite!" (Marjory S. Blumenthal); "The…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Peer reviewed Peer reviewed
Yau, Joe C. K; Hui, Lucas C. K.; Cheung, Bruce; Yiu, S. M. – Internet Research, 2003
Presents a mechanism, the Secure e-Course eXchange (eCX) designed to protect learning material from unauthorized dissemination, and shows how this mechanism can be integrated in the operation model of online learning course providers. The design of eCX is flexible to fit two operating models, the Institutional Server Model and the Corporate Server…
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Computer Security, Computer Software Development
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Pages: 1  |  ...  |  94  |  95  |  96  |  97  |  98  |  99  |  100  |  101  |  102  |  ...  |  109