Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Source
CD-ROM Professional | 1 |
Campus Technology | 1 |
Chronicle of Higher Education | 1 |
College and University | 1 |
D-Lib Magazine | 1 |
Journal of Information Science | 1 |
Library Hi Tech | 1 |
Author
Bacon, Jean | 1 |
Carlson, Scott | 1 |
Fischman, Josh | 1 |
Fredette, Michelle | 1 |
Garrison, William V. | 1 |
Hayton, Richard | 1 |
McClellan, Gregory A. | 1 |
Moody, Ken | 1 |
Oppenheim, Charles | 1 |
Walker, Becki | 1 |
West, Ann | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 9 |
Journal Articles | 7 |
Speeches/Meeting Papers | 2 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
United Kingdom | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to
the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services

Oppenheim, Charles – Journal of Information Science, 1996
Discusses the development a national information policy in the United Kingdom (UK): policies for national information infrastructures, electronic information services, privacy and data protection, copyright, public and national libraries; reviews problems inhibiting Internet use; compares the UK's and the European Commission's approaches to…
Descriptors: Computer Security, Copyrights, Foreign Countries, Information Policy
von Munkwitz-Smith, Jeff; West, Ann – College and University, 2004
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Descriptors: Access to Information, Identification, Information Technology, Educational Policy

McClellan, Gregory A.; Garrison, William V. – Library Hi Tech, 1997
Illustrates an approach for providing networked access to licensed databases over the Internet by positioning the library between patron and vendor. Describes how the gateway systems and database connection servers work and discusses how treatment of security has evolved with the introduction of the World Wide Web. Outlines plans to reimplement…
Descriptors: Access to Information, Computer Networks, Computer Security, Databases

Walker, Becki – CD-ROM Professional, 1995
Describes three companies' approaches to marketing and selling CD-ROM products on the World Wide Web. Benefits include low overhead for Internet-based sales, allowance for creativity, and ability to let customers preview products online. Discusses advertising, information delivery, content, information services, and security. (AEF)
Descriptors: Advertising, Comparative Analysis, Computer Networks, Computer Security
Bacon, Jean; Hayton, Richard; Moody, Ken – D-Lib Magazine, 1998
Describes a security architecture, Oasis, which runs on a middleware platform extended for asynchronous operation; shows how the interoperation of independently developed services may be supported under the Oasis architecture. Uses the provision of digital academic library services as an example. (Author/AEF)
Descriptors: Academic Libraries, Access to Information, Computer Security, Computer Software Development
CAUSE, Boulder, CO. – 1996
Eight papers are presented from the 1995 CAUSE conference track on client/server issues faced by managers of information technology at colleges and universities. The papers include: (1) "The Realities of Client/Server Development and Implementation" (Mary Ann Carr and Alan Hartwig), which examines Carnegie Mellon University's transition…
Descriptors: Colleges, Computer Networks, Computer Security, Computer System Design
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security