Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Higher Education | 3 |
Information Technology | 3 |
Privacy | 3 |
Computer Networks | 2 |
Computer Security | 2 |
Internet | 2 |
Codes of Ethics | 1 |
College Administration | 1 |
College Students | 1 |
Compliance (Legal) | 1 |
Confidential Records | 1 |
More ▼ |
Source
CAUSE/EFFECT | 1 |
EDUCAUSE Quarterly | 1 |
Publication Type
Journal Articles | 2 |
Reports - Evaluative | 2 |
Opinion Papers | 1 |
Reports - Descriptive | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Audience
Administrators | 1 |
Practitioners | 1 |
Location
New York | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 3 |
Digital Millennium Copyright… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Rhinehart, Paul T. – CAUSE/EFFECT, 1996
When used in managing college student records, electronic data interchange allows electronic student records to be fed directly into a receiving institution's database instead of being sent by mail. Although the process offers many clear advantages, one important question that must be addressed is how students' privacy will be protected under a…
Descriptors: College Administration, College Students, Confidential Records, Databases
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality