NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,276 to 1,290 of 1,624 results Save | Export
Carlson, Scott – Chronicle of Higher Education, 2002
Discusses how colleges are creating offices to handle crimes, near-crimes, human errors, dramas, and assorted foibles on increasingly Internet-connected campuses. (EV)
Descriptors: College Students, Computer Security, Crime Prevention, Higher Education
Peer reviewed Peer reviewed
Liao, Gen-Yih; Hwang, Jing-Jang – Internet Research, 2001
Describes an Internet auction model achieving verifiable fairness, a requirement aimed at enhancing the trust of bidders in auctioneers. Analysis results demonstrate that the proposed model satisfies various requirements regarding fairness and privacy. Moreover, in the proposed model, the losing bids remain sealed. (Author/AEF)
Descriptors: Business, Computer Oriented Programs, Computer Security, Consumer Economics
Friedman, Stan, Sr. – Library Journal, 2004
This article describes the results of the 19th annual Computers in Libraries Conference in Washington, DC on March 10-12, 2004. The conference peered into the future, drew lessons from the past, and ran like clockwork. Program chair Jane Dysart and her organizing committee are by now old hands, bringing together three keynote addresses, 100…
Descriptors: Information Technology, Internet, Privacy, Libraries
Stover, Del – Education Digest: Essential Readings Condensed for Quick Review, 2005
This article deals with students hacking school computer systems. School districts are getting tough with students "hacking" into school computers to change grades, poke through files, or just pit their high-tech skills against district security. Dozens of students have been prosecuted recently under state laws on identity theft and unauthorized…
Descriptors: Behavior Problems, Computer Security, High School Students, Crime Prevention
Huwe, Terence – Computers in Libraries, 2005
In recent years, security issues have increasingly come to dominate the technological development process--although still in a more reactive than proactive mode. It now seems more important than ever to monitor security trends and policy developments, especially if technology is regarded as a potential community builder. This article suggests…
Descriptors: Electronic Libraries, Publishing Industry, Information Technology, Crime Prevention
Peer reviewed Peer reviewed
McLaughlin, Josetta; Pavelka, Deborah; McLaughlin, Gerald – Journal of Education for Business, 2005
A significant trend in higher education evolving from the wide accessibility to the Internet is the availability of an ever-increasing supply of data on Web sites for use by professors, students, and researchers. As this usage by a wider variety of users grows, the ability to judge the integrity of the data, the related findings, and the Web site…
Descriptors: Web Sites, Internet, Evaluation, Data
Olson, Gary A. – Chronicle of Higher Education, 2007
Many professors, staff members, and even administrators see campus computers and e-mail accounts as their own private property--a type of employment benefit provided with no constraints on use. The fact is, universities "assign" computer equipment to personnel as tools to help them perform their jobs more effectively and efficiently, in the same…
Descriptors: Ethics, College Faculty, Computer Security, Electronic Mail
Mutch, Andrew; Ventura, Karen – Computers in Libraries, 2006
Every place has it--coffee shops, bookstores, universities ... and now libraries are offering wireless Internet access too. At the Waterford Township Public Library (Waterford, Michigan), Andrew Mutch created a wide-open wireless network using Public IP open source software. About 20 miles away, at the Novi Public Library (Novi, Michigan), Karen…
Descriptors: Telecommunications, Computer Networks, Internet, Public Libraries
Gale, Doug – Campus Technology, 2006
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Descriptors: Human Body, Identification, Technological Advancement, Genetics
Wolfsberg, Jeffrey S. – Education Digest: Essential Readings Condensed for Quick Review, 2006
Once, targets of bullying had to endure it only at school. Now, with the increasing prevalence of cyberbullying it can follow them home and go on 24 hours a day. For students who have been exposed to cyberbullying themselves, for parents who have either been exposed to it or are seeing their child experience it, and for educators who have either…
Descriptors: Computer Mediated Communication, Bullying, Computer Security, School Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Gong, Tao; Cai, Zixing – International Journal on E-Learning, 2006
To overcome weakness and faults of a web-based e-learning course such as Artificial Intelligence (AI), an immune agent was proposed, simulating a natural immune mechanism against a virus. The immune agent was built on the multi-dimension education agent model and immune algorithm. The web-based AI course was comprised of many files, such as HTML…
Descriptors: Educational Technology, Internet, Online Courses, Artificial Intelligence
Cossey, David – Association of Small Computer Users in Education (ASCUE), 2005
Small colleges have unique challenges with respect to their information technology environments. It is easy to forget sometimes that small colleges are not simply small big colleges, and that IT needs to be considered in a particular way, especially because of its associated costs. For one thing, the senior administration at a small college may be…
Descriptors: Information Technology, Small Colleges, Telecommunications, Computers
Peer reviewed Peer reviewed
Cardinali, Richard – Journal of Educational Media and Library Sciences, 1995
Discusses issues of database security and integrity, including computer crime and vandalism, human error, computer viruses, employee and user access, and personnel policies. Suggests some precautions to minimize system vulnerability such as careful personnel screening, audit systems, passwords, and building and software security systems. (JKP)
Descriptors: Computer Security, Crime Prevention, Databases, Information Systems
Field, Judy – Computers in Libraries, 1998
Reviews the Internet and intranets, private communications networks within organizations. Examines extranets (organization's intranet offering password-protected external customer and supplier access to selected portions of its intranet) highlighting the viewpoint of librarians. Discusses extranet issues (security, access, user satisfaction),…
Descriptors: Access to Information, Computer Security, Computer Software Development, Corporations
Peer reviewed Peer reviewed
Jayawardhena, Chanaka; Foley, Paul – Internet Research, 2000
Discussion of changes in the banking industry focuses on an analysis of 12 Internet banking operations in the United Kingdom. Topics include delivery strategies; customer demand and requirements; and an evaluation of banking Web sites that considers speed, content and design, navigation, interactivity, and security. (LRW)
Descriptors: Banking, Computer Security, Content Analysis, Delivery Systems
Pages: 1  |  ...  |  82  |  83  |  84  |  85  |  86  |  87  |  88  |  89  |  90  |  ...  |  109