NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 3 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Rhinehart, Paul T. – CAUSE/EFFECT, 1996
When used in managing college student records, electronic data interchange allows electronic student records to be fed directly into a receiving institution's database instead of being sent by mail. Although the process offers many clear advantages, one important question that must be addressed is how students' privacy will be protected under a…
Descriptors: College Administration, College Students, Confidential Records, Databases
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality