NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 1,516 to 1,530 of 1,624 results Save | Export
Collet, Robert – Telecommunications, 1998
Argues that the Internet can continue its explosive growth only if it is carefully, constantly, and thoughtfully administered. Discusses the role of ISPs (Internet Service Providers); the need to respond to the market force; making the transition from the federal to the commercial level; funding; the domain name server; security; and challenges to…
Descriptors: Computer Security, Financial Support, Futures (of Society), Government (Administrative Body)
Peer reviewed Peer reviewed
Smith, Bruce; Fraser, Bruce T.; McClure, Charles R. – Journal of Academic Librarianship, 2000
Considers selected policy instruments related to federal agencies' deployment of information in a Web environment in terms of five key policy areas: access, security, privacy, intellectual property, and records management. Suggests that there are a significant number of policy instruments affecting federal Web site development. Identifies the need…
Descriptors: Access to Information, Computer Security, Document Delivery, Government Publications
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development
Peer reviewed Peer reviewed
Rovai, Alfred P. – Internet and Higher Education, 2000
Identifies the major principles of general assessment theory, examines how these principles can be applied to online environments for distance education, and describes assessment issues that have special significance in virtual classrooms. Discusses proctored testing, identity security, academic honesty, and use of online discussions for…
Descriptors: Cheating, Computer Security, Constructivism (Learning), Discussion (Teaching Technique)
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This September 24, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "Thank You, Masked Man" (Reilly, Liam); (2) "The Trailing-Spouse…
Descriptors: Higher Education, Biological Sciences, Scholarship, College Faculty
Peer reviewed Peer reviewed
Direct linkDirect link
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2006
This report summarizes much of the data collected through the 2005 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive text in five areas relevant to planning and…
Descriptors: Information Systems, Classification, Information Technology, Higher Education
Dowling, Sue Y. – Georgia School Counselors Association Journal, 2006
School counselors should be knowledgeable about the influence of today's technologies on common issues dealt with in counseling. This article describes several of these issues and how they are affected by use of technology. Suggestions are provided to help counselors deal with the current challenges posed by the use of interactive communication…
Descriptors: Counselor Role, School Counselors, Technology Uses in Education, Counseling
Peer reviewed Peer reviewed
Direct linkDirect link
Baker-Eveleth, Lori; Eveleth, Daniel M.; O'Neill, Michele; Stone, Robert W. – EDUCAUSE Quarterly, 2006
The College of Business and Economics at the University of Idaho conducted a pilot study that used commercially available encryption software called Securexam to deliver computer-based examinations. A multi-step implementation procedure was developed, implemented, and then evaluated on the basis of what students viewed as valuable. Two key aspects…
Descriptors: Business Administration Education, Tests, Data Processing, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Berson, Ilene R.; Berson, Michael J. – Social Education, 2006
Internet users continue to develop new ways of communicating online and disseminating information; one of these methods, the blog, also known as web log, has become a significant cultural phenomenon. Blogs offer an interactive medium for internet users to create and contribute content to the web. In some social studies classrooms, teachers are…
Descriptors: Social Studies, Current Events, Internet, Web Sites
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Cunningham, Alisa F.; Milam, John – National Center for Education Statistics, 2005
This report examines the feasibility of implementing a student unit record system to replace the student-related components that currently are based on aggregate institution-level data collected as part of the Integrated Postsecondary Education Data System (IPEDS). The feasibility study was initiated by the National Center for Education Statistics…
Descriptors: Feasibility Studies, Student Records, Evaluation Methods, Technology Integration
Anderson, Laura Challman; Lotspiech, Jeffrey B. – Bulletin of the American Society for Information Science, 1995
Discusses collaborative efforts by the Institute for Scientific Information (ISI) and the IBM Digital Library Group in creating techniques to ensure information integrity, journal article authenticity, user confidentiality, management of copyright, and general security in electronic libraries. Also describes the rights management and security…
Descriptors: Access to Information, Computer Security, Computer System Design, Confidentiality
Peer reviewed Peer reviewed
Duggan, Brian – TechTrends, 1994
Explores design considerations for a functional microcomputer lab, including ergonomics and furnishings; access for the disabled; the use of other media; hardware security; and software security, including virus protection. A summary paragraph comments on the role of planning and forecasting. A bibliography of eight titles for further reading is…
Descriptors: Accessibility (for Disabled), Audio Equipment, Computer Centers, Computer Security
Peer reviewed Peer reviewed
Dawes, Sharon S.; Pardo, Theresa A.; DiCaterino, Ann – Journal of the American Society for Information Science, 1999
Two Internet testbeds conducted at the New York State Center for Technology in Government (CTG) identified five threshold factors that shape a government agency's ability to initiate Web-based services: technical infrastructure, user capabilities, information content, cost, and security. Six kinds of benefits of the Web to deliver government…
Descriptors: Computer Security, Costs, Federal Government, Federal Programs
Pages: 1  |  ...  |  98  |  99  |  100  |  101  |  102  |  103  |  104  |  105  |  106  |  ...  |  109