NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 151 to 165 of 172 results Save | Export
Carlson, Scott – Chronicle of Higher Education, 2006
During his life and career as a muckraking journalist in Washington, Jack Anderson cultivated secret sources throughout the halls of government--sources who passed on information that allowed Anderson to investigate and write about Watergate, CIA assassination schemes, and countless scandals. His syndicated column, Washington Merry-Go-Round,…
Descriptors: News Reporting, Crime, Academic Libraries, Archives
Peer reviewed Peer reviewed
Direct linkDirect link
Cox, Andrew; Emmott, Stephen – Campus-Wide Information Systems, 2007
Purpose: The purpose of the paper is to summarize the findings of a survey of UK universities about how their websites are managed and resourced, which technologies are in use, and what are seen as the main issues and priorities. Design/methodology/approach: The paper is based on a web-based questionnaire distributed in summer 2006, which received…
Descriptors: Web Sites, Electronic Publishing, Internet, Use Studies
Peer reviewed Peer reviewed
Direct linkDirect link
Pitler, Howard – Innovate: Journal of Online Education, 2006
Technology-savvy instructors often require students to create Web pages or videos, tasks that require finding materials such as images, music, or text on the Web, reusing them, and then republishing them in a technique that author Howard Pitler calls "remixing." However, this requires both the student and the instructor to deal with often thorny…
Descriptors: Legal Problems, Copyrights, Internet, Legal Responsibility
Universities UK, 2007
Governments, public funders of research and universities worldwide are increasingly recognising that improving the dissemination of research raises their research profile and contributes to national competitiveness. The traditional system of research publishing is inefficient, uncompetitive and restrictive. It limits access by researchers and…
Descriptors: Educational Research, Research Reports, Faculty Publishing, Access to Education
Peer reviewed Peer reviewed
Direct linkDirect link
Mitrano, Tracy – EDUCAUSE Review, 2006
The academic research mission requires an open environment to flourish, and the academic teaching mission obligates educators in higher education to spark ethical thinking and to inculcate the appropriate use of new technologies among all of their constituents, especially students. There is no better place to begin those lessons than in the…
Descriptors: Higher Education, Institutional Mission, Information Policy, Social Networks
Barrett, G. Jaia, Ed. – Association of Research Libraries, 2006
"ARL" is the bimonthly report on research library issues and actions from ARL (Association of Research Libraries), CNI (Coalition of Networked Information), and SPARC (Scholarly Publishing and Academic Resources Coalition). "ARL" reports on current issues of interest to academic and research library administrators, staff and users; higher…
Descriptors: Information Policy, Research Libraries, Access to Information, Federal Aid
Peer reviewed Peer reviewed
Direct linkDirect link
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken – EDUCAUSE Quarterly, 2004
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Descriptors: Internet, Computer Security, Computer Networks, Information Technology
Junor, Sean; Kramer, Miriam; Usher, Alex – Online Submission, 2006
Most universities in Canada are spending enormous amounts of effort collecting vast amounts of data, but are still--in some quarters--perceived to be unable to report data effectively. In other countries, this kind of problem has been resolved in two different ways. But in Canada, this hasn't happened. The purpose of this paper is to shed some…
Descriptors: Higher Education, Foreign Countries, Data Collection, Information Management
Ministerial Council on Education, Employment, Training and Youth Affairs (NJ1), 2004
The purpose of these protocols is to assist in providing guidance to PMRT members and Sub-groups in relation to seeking approval for the publication of documents of the Performance Measurement and Reporting Taskforce (PMRT) or of its predecessor the National Education Performance Monitoring Taskforce (NEPMT). These protocols complement the…
Descriptors: Measurement, Publications, Position Papers, Information Policy
Peer reviewed Peer reviewed
Direct linkDirect link
Bates, Melanie; Loddington, Steve; Manuel, Sue; Oppenheim, Charles – ALT-J: Research in Learning Technology, 2007
In the United Kingdom over the past few years there has been a dramatic growth of national and regional repositories to collect and disseminate resources related to teaching and learning. Most notable of these are the Joint Information Systems Committee's Online Repository for [Learning and Teaching] Materials as well as the Higher Education…
Descriptors: Information Systems, Foreign Countries, Rewards, College Faculty
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Peer reviewed Peer reviewed
Direct linkDirect link
Smith, Sean W. – EDUCAUSE Quarterly, 2004
At Dartmouth College, the author teaches a course called "Security and Privacy." Its early position in the overall computer science curriculum means the course needs to be introductory, and the author can't assume the students possess an extensive computer science background. These constraints leave the author with a challenge: to construct…
Descriptors: Homework, Assignments, Privacy, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Shipe, Timothy – Acquisitions Librarian, 2005
The review and negotiation of license agreements has become a time-consuming but necessary part of the job of providing access to the electronic information resources required by libraries' patrons. The nature of these agreements may pose a number of barriers to the development of fully integrated collections. This article presents a fictitious…
Descriptors: Academic Libraries, Barriers, Certification, Contracts
Peer reviewed Peer reviewed
Direct linkDirect link
Kossuth, Joanne; Ballman, Donald – EDUCAUSE Quarterly, 2004
The ancient Romans had it right. The underlying relationships between contracting parties were considered so important among Roman citizens that breaking a contract was considered a serious offense: The breaching party forfeited social position and property, and, if necessary, his family was expected to make good on his contractual promises. In…
Descriptors: Information Systems, Information Technology, Interpersonal Competence, Contracts
Peer reviewed Peer reviewed
Direct linkDirect link
Burrows, Toby – Australian Academic & Research Libraries, 2006
The impact that electronic information technologies have had on scholarly communications and university libraries is assessed. Early predictions that the dominance of commercial publishers would decline and journal prices would fall have not been realised. The development of institutional repositories have had limited success in making the…
Descriptors: Academic Libraries, Research Libraries, Information Technology, Electronic Publishing
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12