Publication Date
| In 2026 | 0 |
| Since 2025 | 61 |
| Since 2022 (last 5 years) | 378 |
| Since 2017 (last 10 years) | 650 |
| Since 2007 (last 20 years) | 1202 |
Descriptor
Source
Author
| Villano, Matt | 9 |
| Goldsborough, Reid | 8 |
| DeBlois, Peter B. | 6 |
| Descy, Don E. | 6 |
| Marquardson, Jim | 6 |
| Panettieri, Joseph C. | 6 |
| Payne, Brian K. | 6 |
| Foster, Andrea L. | 5 |
| Smith, Peter, Ed. | 5 |
| Waters, John K. | 5 |
| Hawkins, Brian L. | 4 |
| More ▼ | |
Publication Type
Education Level
Audience
| Teachers | 43 |
| Administrators | 40 |
| Practitioners | 30 |
| Media Staff | 19 |
| Policymakers | 17 |
| Parents | 11 |
| Students | 11 |
| Support Staff | 3 |
| Community | 2 |
| Counselors | 1 |
| Researchers | 1 |
| More ▼ | |
Location
| United Kingdom | 30 |
| United States | 28 |
| Turkey | 23 |
| Canada | 22 |
| California | 21 |
| Texas | 21 |
| Australia | 18 |
| India | 16 |
| Maryland | 16 |
| Florida | 15 |
| North Carolina | 14 |
| More ▼ | |
Laws, Policies, & Programs
Assessments and Surveys
| Program for International… | 2 |
| ACT Assessment | 1 |
| Big Five Inventory | 1 |
| Rosenberg Self Esteem Scale | 1 |
| Trends in International… | 1 |
What Works Clearinghouse Rating
Spicer, Donald Z.; Deblois, Peter B. – EDUCAUSE Review, 2004
This article features the EDUCAUSE Current Issues Survey. Administered by the EDUCAUSE Current Issues Committee, whose members review and recommend the set of issues to be presented each year, the survey identifies the issues that leaders in higher education information technology see as their most critical IT challenges. The Top-Ten current IT…
Descriptors: Information Technology, Higher Education, Surveys, Financial Support
Rothschild, Daniel; Rezmierski, Virginia – EDUCAUSE Quarterly, 2004
The Computer Incident Factor Analysis and Categorization (CIFAC) Project at the University of Michigan began in September 2003 with grants from EDUCAUSE and the National Science Foundation (NSF). The project's primary goal is to create a best-practices security framework for colleges and universities based on rigorous quantitative analysis of…
Descriptors: Computer Security, Colleges, Statistical Analysis, Literature Reviews
Campbell, John P.; Oblinger, Diana G. – EDUCAUSE Quarterly, 2007
The EDUCAUSE Advisory Committee for Teaching and Learning (ACTL) has identified the key technology-related teaching and learning issues in higher education for 2007. The 10 important teaching and learning issues are: (1) Establishing and supporting a culture of evidence; (2) Demonstrating improvement of learning; (3) Translating learning…
Descriptors: College Instruction, Validity, Educational Improvement, Theory Practice Relationship
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Review, 2007
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2006 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Computer Software, Telecommunications, Computer Networks, Computer Uses in Education
American Association of Community Colleges, 2006
Although homeland security has gained prominence as a national focus and investment, it is clear that much of the most effective preparation must begin at local, state, and regional levels. This report reveals that an astonishing number of community colleges offer degree and certificate programs for first responders--law enforcement officers,…
Descriptors: National Security, Community Colleges, Partnerships in Education, Crisis Management
Kleinwachter, Wolfgang – E-Learning, 2006
This article addresses issues central to the task of Internet governance and, especially, to the management of the Internet's core resources. Early conceptions of the Internet as a virtual space that required no regulation resisted initial governance activity. More recently, work by people like Lawrence Lessig has clarified the complex…
Descriptors: Internet, Public Policy, Governance, Misconceptions
International Journal of Testing, 2006
Developed by the International Test Commission, the International Guidelines on Computer-Based and Internet-Delivered Testing are a set of guidelines specifically developed to highlight good practice issues in relation to computer/Internet tests and testing. These guidelines have been developed from an international perspective and are directed at…
Descriptors: Guidelines, Computer Assisted Testing, Internet, Test Construction
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software
Connolly, Mary V. – 1997
The Internet is a network of networks, sharing the same protocol and linking universities, research communities, businesses, and individuals world wide. In this new global information infrastructure, all citizens need to understand the power and pitfalls of the technology in order to function as responsible members. This paper discusses issues…
Descriptors: Access to Information, Computer Networks, Computer Security, Copyrights
Kendall, Diane S.; Marsh, Merle – 2002
This booklet presents questions and answers on everything from how to find out what technology students will need for college to ideas for handling technology emergencies when they are there at college. Information and selected resources are provided under the following questions that head each section: "How do I find out what technology I should…
Descriptors: College Students, Computer Security, Computer Selection, Computer Software Selection
Institute for Information Studies, Queenstown, MD. – 1999
This collection of commissioned papers provides a variety of perspectives on the impact of global information networks. The following articles are included: "The Promise of Global Networks: An Introduction" (Jorge Reina Schement); "Architecture and Expectations: Networks of the World--Unite!" (Marjory S. Blumenthal); "The…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Security
Peer reviewedRiddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Peer reviewedYau, Joe C. K; Hui, Lucas C. K.; Cheung, Bruce; Yiu, S. M. – Internet Research, 2003
Presents a mechanism, the Secure e-Course eXchange (eCX) designed to protect learning material from unauthorized dissemination, and shows how this mechanism can be integrated in the operation model of online learning course providers. The design of eCX is flexible to fit two operating models, the Institutional Server Model and the Corporate Server…
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Computer Security, Computer Software Development
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Daehn, Ralph M. – Computers in Libraries, 2000
Explains the public printing services available at computer terminals for patrons at the University of Guelph (Ontario) libraries. Highlights include configurations of the public workstations; client and server hardware and software; security features; cost projections; and printing charges. (LRW)
Descriptors: Academic Libraries, Computer Printers, Computer Security, Computer Software

Direct link
