NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,456 to 1,470 of 1,624 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Kleinwachter, Wolfgang – E-Learning, 2006
This article addresses issues central to the task of Internet governance and, especially, to the management of the Internet's core resources. Early conceptions of the Internet as a virtual space that required no regulation resisted initial governance activity. More recently, work by people like Lawrence Lessig has clarified the complex…
Descriptors: Internet, Public Policy, Governance, Misconceptions
Peer reviewed Peer reviewed
Direct linkDirect link
International Journal of Testing, 2006
Developed by the International Test Commission, the International Guidelines on Computer-Based and Internet-Delivered Testing are a set of guidelines specifically developed to highlight good practice issues in relation to computer/Internet tests and testing. These guidelines have been developed from an international perspective and are directed at…
Descriptors: Guidelines, Computer Assisted Testing, Internet, Test Construction
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software
Connolly, Mary V. – 1997
The Internet is a network of networks, sharing the same protocol and linking universities, research communities, businesses, and individuals world wide. In this new global information infrastructure, all citizens need to understand the power and pitfalls of the technology in order to function as responsible members. This paper discusses issues…
Descriptors: Access to Information, Computer Networks, Computer Security, Copyrights
Kendall, Diane S.; Marsh, Merle – 2002
This booklet presents questions and answers on everything from how to find out what technology students will need for college to ideas for handling technology emergencies when they are there at college. Information and selected resources are provided under the following questions that head each section: "How do I find out what technology I should…
Descriptors: College Students, Computer Security, Computer Selection, Computer Software Selection
Institute for Information Studies, Queenstown, MD. – 1999
This collection of commissioned papers provides a variety of perspectives on the impact of global information networks. The following articles are included: "The Promise of Global Networks: An Introduction" (Jorge Reina Schement); "Architecture and Expectations: Networks of the World--Unite!" (Marjory S. Blumenthal); "The…
Descriptors: Access to Information, Computer Mediated Communication, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Riddle, Bob – Library Hi Tech, 1997
Discusses the Inter-CIC Authentication and Authorization Project (ICAAP) of the Big Ten Joint Project (BTJP), a technical group who suggests uses of technology that address business issues commonly shared by Big Ten universities. Describes pilot project goals; the technical, operational, and contractual situation; the World Wide Web transaction…
Descriptors: Computer Security, Computer System Design, Computer Uses in Education, Higher Education
Peer reviewed Peer reviewed
Yau, Joe C. K; Hui, Lucas C. K.; Cheung, Bruce; Yiu, S. M. – Internet Research, 2003
Presents a mechanism, the Secure e-Course eXchange (eCX) designed to protect learning material from unauthorized dissemination, and shows how this mechanism can be integrated in the operation model of online learning course providers. The design of eCX is flexible to fit two operating models, the Institutional Server Model and the Corporate Server…
Descriptors: Computer Assisted Instruction, Computer Mediated Communication, Computer Security, Computer Software Development
Ives, David J. – Computers in Libraries, 1996
Presents security procedures for protecting a library's computer system from potential threats by patrons or personnel, and describes how security can be breached. A sidebar identifies four areas of concern in security management: the hardware, the operating system, the network, and the user interface. A selected bibliography of sources on…
Descriptors: Computer Interfaces, Computer Networks, Computer Security, Information Sources
Daehn, Ralph M. – Computers in Libraries, 2000
Explains the public printing services available at computer terminals for patrons at the University of Guelph (Ontario) libraries. Highlights include configurations of the public workstations; client and server hardware and software; security features; cost projections; and printing charges. (LRW)
Descriptors: Academic Libraries, Computer Printers, Computer Security, Computer Software
Carter, Kim – Technology & Learning, 2001
Describes benefits of programs where schools provide laptop computers for each student. Topics include results of studies that show positive learning outcomes; funding options; implementation; protecting the equipment; resources for learning about laptop programs; staff training and support; and future possibilities, including the implications of…
Descriptors: Computer Assisted Instruction, Computer Networks, Computer Security, Educational Finance
Peer reviewed Peer reviewed
Direct linkDirect link
Maltz, Leslie; DeBlois, Peter D. – EDUCAUSE Review, 2005
Administered by the EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, the sixth annual EDUCAUSE Current Issues Survey was conducted in December of 2004. Survey participants--the primary representatives, typically CIOs, of EDUCAUSE member institutions--were asked to check up to…
Descriptors: Information Technology, Higher Education, Surveys, Financial Support
Peer reviewed Peer reviewed
Direct linkDirect link
Henning, Marcus – Internet and Higher Education, 2004
In the current information age, there is a growing use of and reliance on the Internet. One area of concern for educators is the communication of information using an electronic questionnaire interface. Therefore, it seems pertinent to look at the issue of dissemination of Internet questionnaire information and the integrity of this process.…
Descriptors: Integrity, Questionnaires, Conflict Resolution, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Goel, Sanjay; Pon, Damira; Bloniarz, Peter; Bangert-Drowns, Robert; Berg, George; Delio, Vince; Iwan, Laura; Hurbanek, Thomas; Schuman, Sandoor P.; Gangolly, Jagdish; Baykal, Adnan; Hobbs, Jon – Journal on Educational Resources in Computing, 2006
A novel idea for information security education created by the New York State Center for Information Forensics and Assurance (CIFA) is presented. This new approach incorporates a teaching hospital model originally developed for medical training. In this model, information security problems from industry and government are solved and abstracted…
Descriptors: Feedback (Response), Curriculum Development, Hospitals, Computer Security
Woo, Stu – Chronicle of Higher Education, 2006
San Jose State University is planning to ban Skype, a popular Internet telephone service, from the campus network because of concerns about security and bandwidth. University administrators say that the technical aspects that make Skype effective also make it dangerous and potentially crippling to a university's network bandwidth. Skype has a…
Descriptors: Foreign Countries, Computer Networks, Computer Security, College Faculty
Pages: 1  |  ...  |  94  |  95  |  96  |  97  |  98  |  99  |  100  |  101  |  102  |  ...  |  109