NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 57 results Save | Export
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Lipka, Sara – Chronicle of Higher Education, 2009
Colleges have deployed various tactics over the years to deter illegal file sharing, usually of commercial music and movies, by their students. This month, the U.S. Department of Education will begin crafting regulations that specify strategies, a prospect that is making some campus officials wonder if plans they have already invested in will pass…
Descriptors: Music, Industry, Hearings, Copyrights
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Carlson, Scott – Chronicle of Higher Education, 2001
Colleges are finding that, regardless of the court rulings against Napster, file-sharing services remain popular with students and problematic to campus networks because of the demand placed on bandwidth by music and video files. (EV)
Descriptors: Colleges, Computer Networks, Downloading, Online Systems
Sander, Libby – Chronicle of Higher Education, 2008
After nearly three years of planning, Ohio's higher-education officials are finalizing an ambitious program to grant college credit for some technical courses offered at the state's adult-education centers. The program, called the Career-Technical Credit Transfer, is the latest in a string of state efforts to more closely link work-force training…
Descriptors: Community Colleges, Engineering, Computer Networks, Faculty
Olsen, Florence – Chronicle of Higher Education, 2002
Discusses how colleges are struggling with an increasing number of attacks on their computer systems; as attacks increase, they face tough, expensive challenges in keeping intruders out. (EV)
Descriptors: Computer Networks, Computer Security, Computers, Crime
Olsen, Florence – Chronicle of Higher Education, 2003
Describes how California's Peralta Community Colleges District decided to hire an outside company to manage its computer networks, but that problems cause it to now want a technology boss on its own staff. (EV)
Descriptors: Computer Networks, Computer Uses in Education, Information Technology, Problems
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention
Foster, Andrea L. – Chronicle of Higher Education, 2005
U.S. Supreme Court justices struggled in a lively debate with how to balance the competing interests of the entertainment industry and developers of file-sharing technology. Some justices sharply questioned whether it was fair to hold inventors of a distribution technology liable for copyright infringement, while others suggested that it was wrong…
Descriptors: Copyrights, Computer Networks, Court Litigation, Hearings
Olsen, Florence – Chronicle of Higher Education, 2003
Describes how colleges are taking advantage of bargains on fiber-optic lines to build regional computer networks; some envision a national network for academe. (EV)
Descriptors: Computer Networks, Computer Uses in Education, Higher Education, Information Technology
Jacobson, Robert L. – Chronicle of Higher Education, 1995
Representatives of American publishers have agreed that an assertive new effort is needed to prevent unauthorized copying of electronic materials, particularly through computers linked to the World Wide Web. Copyright management systems are proposed as a means to provide protection for content of intellectual property and for on-line financial…
Descriptors: Computer Networks, Copyrights, Higher Education, Intellectual Property
McDonald, Kim A. – Chronicle of Higher Education, 1994
Collision of a comet with Jupiter beginning July 16, 1994 will be observed by astronomers worldwide, with computerized information relayed to a center at the University of Maryland, financed by the National Aeronautics and Space Administration and National Science Foundation. Geologists and paleontologists also hope to learn more about earth's…
Descriptors: Astronomy, Computer Networks, Higher Education, Information Networks
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4