Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Information Technology | 6 |
Computer Networks | 5 |
Higher Education | 3 |
Internet | 3 |
Campuses | 2 |
College Students | 2 |
Computer Uses in Education | 2 |
Computers | 2 |
Educational Technology | 2 |
Ethics | 2 |
More ▼ |
Source
Campus Technology | 2 |
Chronicle of Higher Education | 1 |
Information Systems Education… | 1 |
Journal of Information… | 1 |
T.H.E. Journal | 1 |
Author
Gale, Doug | 1 |
Howard, Elizabeth V. | 1 |
Li, Chengcheng | 1 |
McDavis, Roderick J. | 1 |
Panettieri, Joseph C. | 1 |
Ramaswami, Rama | 1 |
Woods, David M. | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 6 |
Education Level
Higher Education | 5 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Ohio | 6 |
Washington | 2 |
Arizona | 1 |
Georgia | 1 |
Indiana | 1 |
Massachusetts | 1 |
South Carolina | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Woods, David M.; Howard, Elizabeth V. – Information Systems Education Journal, 2014
Courses in Information Technology Ethics are often designed as discussion-intensive courses where case studies are introduced and evaluated using ethical theories. Although many of the case studies directly apply to our students' online lives, the stories can sometimes seem too far removed from their own experiences. While we read the news…
Descriptors: Active Learning, Learning Activities, Information Technology, Ethics
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Ramaswami, Rama – T.H.E. Journal, 2008
As technology grows more pervasive in education, the data recovery issues that school systems encounter are becoming increasingly problematic, as districts work to accommodate a range of concerns that do not encumber commercial businesses. State and federal laws often require schools to report on student populations and educational progress…
Descriptors: Elementary Secondary Education, Educational Technology, Computer Uses in Education, Technology Integration
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security