NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,291 to 1,305 of 1,624 results Save | Export
Patterson, Kristin – American School Board Journal, 1996
Property theft at schools is a problem districts are having to confront. Deterrents include inventory checks and etching equipment with inventory control numbers. In Washington, D.C., officials are installing high-security equipment such as closed-circuit television, fiber-optics lines to secure computers, and motion detectors. (MLF)
Descriptors: Alarm Systems, Computer Security, Cost Effectiveness, Crime Prevention
Peer reviewed Peer reviewed
Khosrow-Pour, Mehdi; Herman, Nancy – Electronic Library, 2001
Discusses results of a Delphi study that explored issues related to the utilization and management of Web-enabled technologies by modern organizations. Topics include bandwidth restrictions; security; data integrity; inadequate search facilities; system incompatibilities; failure to adhere to standards; email; use of metadata; privacy and…
Descriptors: Computer Security, Delphi Technique, Electronic Mail, International Law
Peer reviewed Peer reviewed
Direct linkDirect link
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security
Johnson, Doug – Library Media Connection, 2005
School tech services may use firewall filters to protect computer users from computer virus programs that spread as e-mail attachments, hidden in programs downloaded from Web sites, and as macros in word processing and other documents. Backups, the copy of self-created documents and grade book data should be stored in online storage space or DVD…
Descriptors: Word Processing, Electronic Mail, Information Technology, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
von Munkwitz-Smith, Jeff; West, Ann – College and University, 2004
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Descriptors: Access to Information, Identification, Information Technology, Educational Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Stella, Antony; Gnanam, A. – Higher Education: The International Journal of Higher Education and Educational Planning, 2004
Integration of technology in all forms of education has narrowed down the gap between the on- and off-campus students and has resulted in the use of the more broad-based term "distributed learning". Consequently, distance learning is seen as a subset of distributed learning, focusing on students who may be separated in time and space from their…
Descriptors: Quality Control, Distance Education, Technology Integration, Educational Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ferguson, Aaron J. – EDUCAUSE Quarterly, 2005
The United States Military Academy (USMA) at West Point had a problem with some cadets clicking on suspicious attachments and embedded links, significantly affecting network performance and resource availability. West Point information technology leadership needed a way to increase e-mail security awareness in hopes of maintaining a strong…
Descriptors: Information Technology, Educational Technology, Internet, Electronic Mail
Riley, Sheila – Technology & Learning, 2007
It is not always easy to find the balance between protecting students from Internet dangers and distractions and reaping its benefits--but it is certainly on every district's tech priority list. Sharnell Jackson, chief e-learning officer for the 415,000-student Chicago Public Schools, and Miguel Guhlin, director of instructional technology…
Descriptors: Computer Security, School Safety, Computer Mediated Communication, Parent Education
Dixit, R. K. – Online Submission, 2009
Articles in this issue of "Global Journal of Computer Science and Technology" include: (1) Input Data Processing Techniques in Intrusion Detection Systems--Short Review (Suhair H. Amer and John A. Hamilton, Jr.); (2) Semantic Annotation of Stock Photography for CBIR Using MPEG-7 standards (R. Balasubramani and V. Kannan); (3) An Experimental Study…
Descriptors: Knowledge Management, Photography, Semantics, Computer Software
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yi, Qing; Zhang, Jinming; Chang, Hua-Hua – ETS Research Report Series, 2006
Chang and Zhang (2002, 2003) proposed several baseline criteria for assessing the severity of possible test security violations for computerized tests with high-stakes outcomes. However, these criteria were obtained from theoretical derivations that assumed uniformly randomized item selection. The current study investigated potential damage caused…
Descriptors: Computer Assisted Testing, Adaptive Testing, Test Items, Computer Security
Newman, Scott – Techniques: Connecting Education and Careers, 2007
During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…
Descriptors: Student Interests, Graduates, Information Technology, Computer Security
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Villano, Matt – Campus Technology, 2007
Nowadays, college and university auxiliary services departments are turning to text messaging types of technologies to move a host of programs and offerings into the mobile environment. A July 2007 study by Youth Trends indicated that 95 percent of college freshmen come to school with a cell phone or other handheld device, and 78 percent of them…
Descriptors: Higher Education, College Students, Communication Strategies, College Administration
Peer reviewed Peer reviewed
Direct linkDirect link
Richards, Griff; Donkers, Peter; Hatala, Marek; Dufresne, Aude – Interactive Learning Environments, 2007
Campus Canada promotes lifelong learning through the articulation of workplace and other experiential learning for academic credit. This paper describes the recent re-development of the Record of Learning (RoL) component of the Campus Canada's e-Portfolio System. In matching the academic members' desires for provision of secure e-transcripts with…
Descriptors: Foreign Countries, Validity, Competence, Experiential Learning
Helal, Sumi, Ed.; Oie, Yuji, Ed.; Chang, Carl, Ed.; Murai, Jun, Ed. – 2003
This proceedings from the 2003 Symposium on Applications and the Internet (SAINT) contains papers from sessions on: (1) mobile Internet, including a target-driven cache replacement policy, context-awareness for service discovery, and XML transformation; (2) collaboration technology I, including human-network-based filtering, virtual collaboration…
Descriptors: Computer Oriented Programs, Computer Security, Information Retrieval, Information Services
Pages: 1  |  ...  |  83  |  84  |  85  |  86  |  87  |  88  |  89  |  90  |  91  |  ...  |  109