NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 8 results Save | Export
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
National Association of State Universities and Land-Grant Colleges, 2004
This document represents the higher education and library community's guiding public policy agenda on information technology (IT) for the current year. The Higher Education Information Technology (HEIT) Alliance is a coalition of 11 national higher education and library associations, whose members represent a broad array of stakeholders on college…
Descriptors: Telecommunications, Library Associations, Information Technology, Intellectual Property
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Colman, Sue – Australian Universities' Review, 1997
Issues of privacy, anonymity, and computer security emerging with advancing information technology are outlined, and implications for universities are discussed. Emphasis is on the Australian context and on Australian government and international initiatives concerning privacy. Sensitive information categories are identified, and measures…
Descriptors: Access to Information, College Administration, Computer Security, Confidentiality
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software
Ohio State Univ., Columbus. Tech Prep Curriculum Services. – 2000
This profile provides the curricular framework for Ohio Tech Prep programs in e-commerce marketing beginning in high school and continuing through the end of the associate degree. It includes a comprehensive set of e-commerce marketing competencies that reflect job opportunities and skills required for e-commerce marketing professionals today and…
Descriptors: Articulation (Education), Associate Degrees, Business Administration, Business Communication
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This December 10, 2004 issue of "Chronicle of Higher Education" includes the following articles: (1) "The Mental-Health Crisis: What Colleges Must Do" (Kadison, Richard…
Descriptors: Eating Disorders, College Presidents, Elections, Deception