Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 13 |
Descriptor
Computer Security | 22 |
School Security | 22 |
Higher Education | 9 |
Crime Prevention | 6 |
Computer Networks | 4 |
Computer Uses in Education | 4 |
Computers | 4 |
Educational Technology | 4 |
Guidelines | 4 |
Security Personnel | 4 |
Alarm Systems | 3 |
More ▼ |
Source
Author
Villano, Matt | 3 |
Allison, Debra H. | 1 |
Anderson, Alicia | 1 |
Basken, Paul | 1 |
Blezard, Rob | 1 |
Bruhn, Mark | 1 |
Carlson, Scott | 1 |
Corn, Michael | 1 |
Custer, William L. | 1 |
DeBlois, Peter B. | 1 |
Enderle, Jerry | 1 |
More ▼ |
Publication Type
Reports - Descriptive | 22 |
Journal Articles | 21 |
Guides - Non-Classroom | 1 |
Education Level
Higher Education | 9 |
Postsecondary Education | 3 |
Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Skurnac, Steve – American School & University, 2012
Data security breaches in the educational sector can be devastating to institutions and the students and employees they serve. They carry the potential for identity theft, violations of federal and state laws, and loss of trust of students, alumni and employees. The Identity Theft Resource Center says that as of October 2011, education…
Descriptors: Video Technology, Employees, School Security, Electronics
Schneider, Tod – National Clearinghouse for Educational Facilities, 2010
Over the past decade electronic security technology has evolved from an exotic possibility into an essential safety consideration. Before resorting to high-tech security solutions, school officials should think carefully about the potential for unintended consequences. Technological fixes may be mismatched to the problems being addressed. They can…
Descriptors: School Security, Information Technology, Safety, School Personnel
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Sharp, Linda – School Business Affairs, 2011
School system leaders never know when disaster may strike. Having a plan in place to protect vital data and systems is crucial. School system leaders need to be actively involved in crisis preparedness, planned response, and recovery to ensure student and staff safety and to make certain that all important operations, services, processes, and…
Descriptors: School Security, Crisis Management, Emergency Programs, School Safety
Custer, William L. – New Directions for Institutional Research, 2010
Information security threats to educational institutions and their data assets have worsened significantly over the past few years. The rich data stores of institutional research are especially vulnerable, and threats from security breaches represent no small risk. New genres of threat require new kinds of controls if the institution is to prevent…
Descriptors: Institutional Research, Databases, School Security, Computer Security
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Allison, Debra H.; DeBlois, Peter B. – EDUCAUSE Review, 2008
EDUCAUSE presents the top-ten IT-related issues in terms of strategic importance to the higher education institution, as revealed by the ninth annual EDUCAUSE Current Issues Survey. This year, "Security" moves back to the top of the list. (Contains 20 notes.)
Descriptors: Higher Education, Educational Technology, Computer Uses in Education, Computer Security
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Enderle, Jerry – School Planning & Management, 2003
Discusses issues of security for school computer networks, including protection against viruses and hackers. (EV)
Descriptors: Computer Networks, Computer Security, School Security
Villano, Matt – Campus Technology, 2008
Building access control (BAC)--a catchall phrase to describe the systems that control access to facilities across campus--has traditionally been handled with remarkably low-tech solutions: (1) manual locks; (2) electronic locks; and (3) ID cards with magnetic strips. Recent improvements have included smart cards and keyless solutions that make use…
Descriptors: Computer Uses in Education, Technological Advancement, Technology Uses in Education, Video Technology
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Waters, John K. – T.H.E. Journal, 2007
The problem with traditional, perimeterbased security methods is twofold: First, they can stifle the educational mission that district networks were created to encourage. Firewalls can thwart hackers, but they can also prevent staff and students from accessing online tools or information. Second, these approaches tend to provide inadequate…
Descriptors: Internet, Educational Technology, Computers, Electronic Equipment
Carlson, Scott – Chronicle of Higher Education, 2002
Discusses how colleges are creating offices to handle crimes, near-crimes, human errors, dramas, and assorted foibles on increasingly Internet-connected campuses. (EV)
Descriptors: College Students, Computer Security, Crime Prevention, Higher Education

Bruhn, Mark; Gettes, Michael; West, Ann – Educause Quarterly, 2003
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Elementary Secondary Education
McQuade, Samuel C., III – Chronicle of Higher Education, 2007
A growing body of empirical research strongly suggests that adolescents and young adults are increasingly becoming both victims and perpetrators of crime and abuse enabled by information technology. The US federal government has stressed technological, legislative, and law-enforcement solutions to these problems. Efforts to protect children have…
Descriptors: Higher Education, Young Adults, Information Technology, Federal Government
Previous Page | Next Page ยป
Pages: 1 | 2