NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 465 results Save | Export
Yihe Zhang – ProQuest LLC, 2024
Machine learning (ML) techniques have been successfully applied to a wide array of applications. This dissertation aims to take application data handling into account when developing ML-based solutions for real-world problems through a holistic framework. To demonstrate the generality of our framework, we consider two real-world applications: spam…
Descriptors: Artificial Intelligence, Problem Solving, Social Media, Computer Mediated Communication
Jackie Christopher Scott – ProQuest LLC, 2023
Although there have been numerous technological advancements in the last several years, there continues to be a real threat as it pertains to social engineering, especially phishing, spear-phishing, and Business Email Compromise (BEC). While the technologies to protect corporate employees and network borders have gotten better, there are still…
Descriptors: Information Security, Computer Mediated Communication, Electronic Mail, Computer Science Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ozan, Ozlem – Turkish Online Journal of Distance Education, 2013
Social networks and mobile technologies are transforming learning ecology. In this changing learning environment, we find a variety of new learner needs. The aim of this study is to investigate how to provide scaffolding to the learners in connectivist mobile learning environment: (1) to learn in a networked environment; (2) to manage their…
Descriptors: Foreign Countries, Social Networks, Distance Education, Educational Environment
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
O'Hanlon, Charlene – T.H.E. Journal, 2009
On Dec. 1, 2006, the once ambiguous role of e-mails in court cases became much more clear. On that day, the Federal Rules of Civil Procedure (FRCP), which govern federal civil litigation, were amended to establish standards for the discovery of electronically stored information, now known as e-discovery. Many corporations began moving quickly to…
Descriptors: Emergency Programs, Labor Standards, School Districts, Court Litigation
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Demski, Jennifer – Campus Technology, 2009
This article describes how centralized presentation control systems enable IT support staff to monitor equipment and assist end users more efficiently. At Temple University, 70 percent of the classrooms are equipped with an AMX touch panel, linked via a Netlink controller to an in-classroom computer, projector, DVD/VCR player, and speakers. The…
Descriptors: Internet, Technological Advancement, Technology Uses in Education, Computer Uses in Education
Trotter, Andrew – Education Week, 2006
This article deals with federal E-rate program's support of school leaders' Blackberry habit. The Federal Communications Commission (FCC) has cleared the way to allow money from the $2.25 billion program of subsidies for school technology to apply to e-mail service for mobile, wireless devices, such as the BlackBerry, which are increasingly…
Descriptors: Internet, Electronic Mail, Telecommunications, Computer Networks
Hazari, Sunil – Collegiate Microcomputer, 1990
Discusses the use of telecommunications technology to exchange electronic mail, files, and messages across different computer networks. Networks highlighted include ARPA Internet; BITNET; USENET; FidoNet; MCI Mail; and CompuServe. Examples of the successful use of networks in higher education are given. (Six references) (LRW)
Descriptors: Computer Networks, Electronic Mail, Higher Education, Telecommunications
Sullivan, Christopher – 1989
Electronic mail is one of several telecommunications technologies that have become potent factors in modern organizational communication. The introduction of such sophisticated microelectronic technology into an organization can have a strong impact on the patterns of communication within that organization. This is the case for the Florida House…
Descriptors: Computer Networks, Electronic Mail, Online Systems, Organizational Communication
Parker, Donald C. – Executive Educator, 1987
Describes an electronic mail system used by the Horseheads (New York) Central School Distict's eight schools and central office that saves time and enhances productivity. This software calls up information from the district's computer network and sends it to other users' special files--electronic "mailboxes" set aside for messages and…
Descriptors: Computer Networks, Efficiency, Electronic Mail, Elementary Secondary Education
Peer reviewed Peer reviewed
Alm, Andy – Convergence, 1992
Describes computer networks and conferences dedicated to environmental education and activism. Gives the electronic and surface mail addresses of contacts for the Association for Progressive Communications in 12 countries. (SK)
Descriptors: Computer Networks, Electronic Mail, Environmental Education, Organizations (Groups)
Nickerson, Gord – Computers in Libraries, 1992
Discussion of computer-mediated communication focuses on the development of the BITNET computer network. The use of BITNET for interactive messaging, batch file transfer, and electronic mail is described; server programs are explained; and possible future developments of BITNET are discussed. (seven references) (LRW)
Descriptors: Computer Networks, Computer Software, Electronic Mail, Futures (of Society)
Peer reviewed Peer reviewed
Falk, Howard – Electronic Library, 1999
Examines some frequently encountered unsolicited computer intrusions, including computer viruses, worms, Java applications, trojan horses or vandals, e-mail spamming, hoaxes, and cookies. Also discusses virus-protection software, both for networks and for individual users. (LRW)
Descriptors: Computer Networks, Computer Security, Computer Software, Computers
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  31