NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Ekhaml, Leticia – School Library Media Activities Monthly, 2001
Describes a variety of Internet threats to computers and networks used in schools. Discusses electronic trashing; clearing hard drives; cyber spying on Web sites visited; protection against cyber spying, including disposable email accounts; password sniffers; privacy policies; email snooping; email attachments that carry viruses; and hoaxes. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Electronic Mail
Dern, Daniel P. – Online, 1997
Online users leave traces that others can find and use. Provides an overview of where and how users leave traces and what users can do to protect their privacy. Discusses Internet accounts; special files ("signature,""plan,""project,""file,""finger,""whois," and "vacation");…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Privacy
Shea, Virginia – EDUCOM Review, 1994
Discusses rules of etiquette for communicating via computer networks, including conversing as politely as you would face-to-face; ethical behavior; becoming familiar with the domain that you are in; rules for discussion groups; quality of writing; sharing appropriate knowledge; and respecting individuals' privacy. (LRW)
Descriptors: Communication (Thought Transfer), Computer Mediated Communication, Computer Networks, Electronic Mail
Goode, Joanne; Johnson, Maggie – Online, 1991
Presents a summary of guidelines for the use of electronic mail (e-mail) and examines legal issues and existing law governing electronic communication. The Electronic Communications Privacy Act of 1986 is discussed, lawsuits involving e-mail are described, and the future of e-mail privacy is considered. (11 references) (LRW)
Descriptors: Computer Networks, Court Litigation, Electronic Mail, Federal Legislation
Hill, Julia M. – Electronic Networking: Research, Applications and Policy, 1992
The X.500 Directory Service provides a mechanism for finding information about people, organizations, services, network hardware, and more in the global network environment. Issues involved in X.500 participation by an organization include management support, data gathering, rights and concerns of individuals, access control, privacy, accuracy,…
Descriptors: Access to Information, Computer Networks, Directories, Electronic Mail
McCollum, Roy – 1995
With today's growth in the use of electronic information systems for e-mail, data development and research, and the relative ease of access to such resources, protecting one's data and correspondence has become a great concern. "Pretty Good Privacy" (PGP), an encryption program developed by Phil Zimmermann, may be the software tool that…
Descriptors: Access to Information, Coding, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Gil-Garcia, J. Ramon – Journal of Government Information, 2004
Drawing on a review of government information management and information technology (IT) success factors, this paper compares the availability of IT policies and standards in the states. Two main objectives guide the comparative review effort. The first is to show what kinds of information policies the different states make available to citizens…
Descriptors: State Government, Information Management, Information Technology, Policy
Baldwin, George D. – ED, Education at a Distance, 1994
Evaluates the use of computer-mediated communication in a sociology course at Henderson State University (Arkansas). Highlights include information literacy and liberal arts education; critical thinking; computer conferencing on campus networks; online teaching methods and evaluation; student characteristics; electronic mail; privacy and freedom…
Descriptors: Computer Mediated Communication, Computer Networks, Course Evaluation, Critical Thinking