NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Foundation for Excellence in Education (ExcelinEd), 2014
A full year of progress in advancing education reform across America is documented in each of the Foundation for Excellence in Education's Annual Reports. The illustrated pages of the 2014 report, provide data-rich updates on Excellence in Education's work to advance student-centered policies in more than 40 states, all aimed at improving learning…
Descriptors: Educational Change, Educational Quality, Excellence in Education, Student Centered Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Workman, Sue; Childs, Melody; Causey, Jim; Moberly, Brent; Fitzpatrick, Christine – EDUCAUSE Quarterly, 2006
At the beginning of an academic year, thousands of students move into campus housing on Indiana University's Bloomington and Indianapolis campuses within a three-day period, and more than 96 percent arrive with at least one personal computer (and possibly also a PDA, cell phone, and gaming system), and most expect to connect to the campus network…
Descriptors: Computer Networks, Student Personnel Services, Information Technology, Computer Security
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security