Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 3 |
Audits (Verification) | 2 |
Higher Education | 2 |
Information Technology | 2 |
Internet | 2 |
Administrative Organization | 1 |
Automation | 1 |
Awards | 1 |
Centralization | 1 |
Client Server Architecture | 1 |
Colleges | 1 |
More ▼ |
Source
Campus Technology | 3 |
Author
Grush, Mary | 1 |
Panettieri, Joseph C. | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 2 |
Opinion Papers | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
California | 3 |
Texas | 2 |
Alaska | 1 |
Arizona | 1 |
Massachusetts | 1 |
Missouri | 1 |
New Jersey | 1 |
New York | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security
Campus Technology, 2007
This article profiles the winners of this year's competition for outstanding technology innovation on US college and university campuses. The winners are: (1) Rice University, Texas (virtualized networks); (2) Drexel University, Pennsylvania (rich media); (3) Harvard Business School, Massachusetts (network management); (4) Louisiana State…
Descriptors: Educational Innovation, Awards, Emergency Programs, Higher Education
Panettieri, Joseph C. – Campus Technology, 2006
Simplifying and securing an IT infrastructure is not easy. It frequently requires rethinking years of hardware and software investments, and a gradual migration to modern systems. Even so, writes the author, universities can take six practical steps to success: (1) Audit software infrastructure; (2) Evaluate current applications; (3) Centralize…
Descriptors: Information Technology, Universities, Audits (Verification), Computer Software