Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 13 |
Descriptor
Source
Author
DeBlois, Peter B. | 4 |
Camp, John S. | 2 |
Akins, M. L. | 1 |
Allison, Debra H. | 1 |
Bailey, Paul | 1 |
Bellos, Nephellie | 1 |
Brookes, Kimberly H. | 1 |
Carlson, Scott | 1 |
Corn, Michael | 1 |
Daisy Imbaquingo | 1 |
DeBlois, Peter D. | 1 |
More ▼ |
Publication Type
Journal Articles | 21 |
Reports - Descriptive | 18 |
Opinion Papers | 2 |
Reports - Research | 2 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 13 |
Postsecondary Education | 4 |
Elementary Secondary Education | 2 |
Audience
Location
Greece | 1 |
Illinois | 1 |
Kansas | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Daisy Imbaquingo; Javier Díaz; José Jácome – Journal of Technology and Science Education, 2024
Higher Education Institutions (HEIs) need a specialized computer audit method to minimize quality and security risks and facilitate institutional evaluation and accreditation. This study aimed to develop a Computer Audit Method for HEIs (MAIIES) providing methodological support for the computer audit process. The MAIIES method includes planning,…
Descriptors: Computer Security, Audits (Verification), Information Security, Risk
Richardson, Michael D.; Lemoine, Pamela A.; Stephens, Walter E.; Waller, Robert E. – Educational Planning, 2020
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st century. Computer security is an essential instrument for protecting children, but K-12 schools are considered one of the most attractive targets for data privacy crimes often due to the less-than-effective cybersecurity practices in schools. The human…
Descriptors: Elementary Secondary Education, Computer Security, Information Security, Privacy
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Sharp, Linda – School Business Affairs, 2011
School system leaders never know when disaster may strike. Having a plan in place to protect vital data and systems is crucial. School system leaders need to be actively involved in crisis preparedness, planned response, and recovery to ensure student and staff safety and to make certain that all important operations, services, processes, and…
Descriptors: School Security, Crisis Management, Emergency Programs, School Safety
Sextos, Anastasios G. – European Journal of Engineering Education, 2014
This paper presents the structure of an undergraduate course entitled "programming techniques and the use of specialised software in structural engineering" which is offered to the fifth (final) year students of the Civil Engineering Department of Aristotle University Thessaloniki in Greece. The aim of this course is to demonstrate the…
Descriptors: Foreign Countries, Undergraduate Students, Undergraduate Study, Civil Engineering
Ingerman, Bret L.; Yang, Catherine – EDUCAUSE Review, 2010
The eleventh annual EDUCAUSE Current Issues Survey shows some very familiar themes among the top-ten IT issues of strategic importance to technology leaders in higher education. Indeed, all ten of the issues from the 2009 survey are back, albeit in a slightly different order. In addition, Strategic Planning returns as an issue of renewed…
Descriptors: Higher Education, Information Technology, Needs Assessment, Context Effect
Kuhn, Robert M.; Brookes, Kimberly H.; Bellos, Nephellie – EDUCAUSE Quarterly, 2008
Discussions with a central IT organization about integration with existing systems on campus, support costs for the new implementation, and total cost of ownership frequently become adversarial. Simmons College, a small college in Boston with an enrollment of approximately 1,900 undergraduate and 2,800 graduate students, reframed these issues in…
Descriptors: Small Colleges, Educational Technology, Information Technology, School Policy
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services
Allison, Debra H.; DeBlois, Peter B. – EDUCAUSE Review, 2008
EDUCAUSE presents the top-ten IT-related issues in terms of strategic importance to the higher education institution, as revealed by the ninth annual EDUCAUSE Current Issues Survey. This year, "Security" moves back to the top of the list. (Contains 20 notes.)
Descriptors: Higher Education, Educational Technology, Computer Uses in Education, Computer Security
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Dewey, Barbara I.; DeBlois, Peter B. – EDUCAUSE Review, 2006
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2005 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Information Technology, Surveys, Annual Reports, Strategic Planning
Akins, M. L.; Griffin, J. R. – Computers in Libraries, 1999
Presents the main ingredients for successful computer-systems administration. Discusses training and ongoing support, change management for system upgrades, developing a problem-reporting form and keeping the documentation history, managing technical support, and having a disaster-recovery plan. (AEF)
Descriptors: Administration, Change Strategies, Computer Oriented Programs, Computer Security
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2007
The Eighth Annual EDUCAUSE Current Issues Survey asked campus information technology leaders to rate the most critical IT challenges facing them, their campuses, and/or their systems. Four findings associated with all respondents to this year's survey merit special mention. First, for the 2007 survey, the CIC decided to split a key issue choice…
Descriptors: Information Systems, Information Technology, Computer Uses in Education, Computer Security
Williams, Cheryl S.; Krueger, Keith R. – T.H.E. Journal, 2005
Most educators have little experience or expertise in cybersecurity. Yet, it is one of the most pressing vulnerabilities in today's society. Beyond simply being aware of this vulnerability, educational leaders must ask themselves: What is an effective strategy for managing cybersecurity concerns? Whom do you trust to give you the best information?…
Descriptors: Boards of Education, Computer Security, Crime, School Districts
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Previous Page | Next Page »
Pages: 1 | 2