Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 3 |
Technology Integration | 3 |
Information Policy | 2 |
Information Technology | 2 |
Activism | 1 |
Administration | 1 |
Check Lists | 1 |
College Libraries | 1 |
College Students | 1 |
Community Colleges | 1 |
Computer Mediated… | 1 |
More ▼ |
Source
Community & Junior College… | 1 |
Author
Shelton, Kay | 1 |
Stover, Mark | 1 |
Publication Type
Books | 1 |
Guides - Non-Classroom | 1 |
Journal Articles | 1 |
Reports - Descriptive | 1 |
Reports - Evaluative | 1 |
Education Level
Two Year Colleges | 1 |
Audience
Media Staff | 3 |
Administrators | 2 |
Practitioners | 2 |
Location
Canada | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Shelton, Kay – Community & Junior College Libraries, 2009
The media often report on the negativity of Facebook, with horror stories of people losing their jobs because of something they posted. There can be useful purposes for Facebook, however, especially after the unthinkable happens on a college campus. Community college libraries can incorporate Facebook into their security planning.
Descriptors: Community Colleges, College Libraries, Social Networks, Computer Mediated Communication
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines
Alberta Dept. of Education, Edmonton. – 1999
This paper provides a snapshot of the computer network security industry and addresses specific issues related to network security in public education. The following topics are covered: (1) security policy, including reasons for establishing a policy, risk assessment, areas to consider, audit tools; (2) workstations, including physical security,…
Descriptors: Check Lists, Computer Networks, Computer Security, Computer Software