NotesFAQContact Us
Search Tips
What Works Clearinghouse Rating
Showing 16 to 30 of 60 results Save | Export
Gale, Doug – Campus Technology, 2007
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Descriptors: Computer Security, Prevention, Guidelines, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Dunker, Mary – EDUCAUSE Review, 2004
Though many people remember the eye-scanner identification device used in James Bond films in the 1980s, the technology remained a fiction until recently. Now, with the need for more secure systems and with the decrease in biometric technology costs, some colleges and universities are taking a close look at this same technology for security…
Descriptors: Identification, Information Technology, School Security, Higher Education
Sánchez, Inmaculada Arnedillo, Ed.; Isaías, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers of the 12th International Conference on Mobile Learning 2016, which was organized by the International Association for Development of the Information Society, in Vilamoura, Algarve, Portugal, April 9-11, 2016. The Mobile Learning 2016 Conference seeks to provide a forum for the presentation and discussion of…
Descriptors: Foreign Countries, Conferences (Gatherings), Conference Papers, Telecommunications
Edo, Galaxy Samson – ProQuest LLC, 2012
Electronic-authentication methods, no matter how sophisticated they are in preventing fraud, must be able to identify people to a reasonable degree of certainty before any credentials are assured (Personix, 2006). User authentication is different from identity verification, and both are separate but vital steps in the process of securing…
Descriptors: Human Body, Technological Advancement, Information Technology, Identification
Szczerba, Peter – American School & University, 2000
Explains how integrating information technology can extend the capabilities of school security systems far beyond traditional card access. Use of biometric identification technologies and digitized event recording are explored. (GR)
Descriptors: Information Technology, Postsecondary Education, School Security
Peer reviewed Peer reviewed
Direct linkDirect link
Marzin, Patricia; de Vries, Erica – International Journal of Technology and Design Education, 2013
Making the connection between science and technology might be important for students to learn to identify and solve problems and to acquire scientific knowledge and skills. The research reported in this article concerned the development of a design situation in a science classroom and the study of students performing in this situation. More…
Descriptors: Problem Solving, Prior Learning, Anatomy, Evolution
Villano, Matt – Campus Technology, 2008
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Descriptors: Computer Uses in Education, Technological Advancement, Technology Uses in Education, Video Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Ann, Ong Chin; Theng, Lau Bee – Interactive Technology and Smart Education, 2012
Purpose: The purpose of this paper is to investigate an idea of producing an assistive and augmentative communication (AAC) tool that uses natural human computer interfacing to accommodate the disabilities of children with cerebral palsy (CP) and assist them in their daily communication. Design/methodology/approach: The authors developed a…
Descriptors: Foreign Countries, Developing Nations, Augmentative and Alternative Communication, Cerebral Palsy
West, Cynthia K. – 2001
This book examines the intersection of information technologies, power, people, and bodies. It explores how information technologies are on a path of creating efficiency, productivity, profitability, surveillance, and control, and looks at the ways in which human-machine interface technologies, such as wearable computers, biometric technologies,…
Descriptors: Change, Computer Interfaces, Futures (of Society), Information Industry
Tappert, Charles C.; Agerwala, Tilak – Association Supporting Computer Users in Education, 2019
This paper discusses our experiences teaching a doctoral-level course in emerging information technologies. The concept of emerging technologies is put into context by describing the technology life cycle. The emerging information technologies of current interest -- Artificial Intelligence and related areas, Collective Human-Computer Intelligence,…
Descriptors: Graduate Study, Information Technology, Artificial Intelligence, Quantum Mechanics
Peer reviewed Peer reviewed
Direct linkDirect link
Kaklauskas, A.; Zavadskas, E. K.; Pruskus, V.; Vlasenko, A.; Seniut, M.; Kaklauskas, G.; Matuliauskaite, A.; Gribniak, V. – Computers & Education, 2010
All distance learning participants (students, professors, instructors, mentors, tutors and the rest) would like to know how well the students have assimilated the study materials being taught. The analysis and assessment of the knowledge students have acquired over a semester are an integral part of the independent studies process at the most…
Descriptors: Distance Education, Academic Degrees, Program Effectiveness, Grading
Gale, Doug – Campus Technology, 2006
Authentication is based on something one knows (e.g., a password), something one has (e.g., a driver's license), or something one is (e.g., a fingerprint). The last of these refers to the use of biometrics for authentication. With the blink of an eye, the touch of a finger, or the uttering of a pass-phrase, colleges and schools can now get deadly…
Descriptors: Human Body, Identification, Technological Advancement, Genetics
Peer reviewed Peer reviewed
Direct linkDirect link
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Kim, Jungsun – ProQuest LLC, 2009
Hoteliers have installed new technology, such as self-service and wireless technology, to improve customer service or to increase revenue. However, it seems that they tend to either be unaware of or ignore potential vulnerability of their systems when they add more technologies. The underestimated risks can possibly result in massive losses for…
Descriptors: Hospitality Occupations, Intention, Risk, Program Effectiveness
McGraw, Tammy, Ed. – INSIGHT, 2002
This publication focuses on promising new and emerging technologies and what they might mean to the future of K-12 schools. Half of the volume contains articles devoted in some way to "Vision," and articles in the other half are under the heading of "Leadership." Contents in the "Vision" section include: "The…
Descriptors: Educational Development, Educational Planning, Educational Technology, Elementary Secondary Education
Pages: 1  |  2  |  3  |  4