Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Computer Security | 5 |
Performance Technology | 5 |
Information Policy | 3 |
Troubleshooting | 3 |
Academic Freedom | 2 |
Campuses | 2 |
Case Studies | 2 |
Computer Networks | 2 |
Crime Prevention | 2 |
Higher Education | 2 |
Human Factors Engineering | 2 |
More ▼ |
Source
Campus Technology | 5 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Education Level
Higher Education | 4 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to
the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Schaffhauser, Dian – Campus Technology, 2008
Data loss from life's little power calamities may be the most common form of IT disaster any campus can face. According to a 2007 industry association survey(www.connect.educause.edu/library/ecar/shelterfromthestormitandb/41174), 82 percent of higher education institutions reporting a disruptive occurrence in the five years prior to the study…
Descriptors: Higher Education, Computer Security, Troubleshooting, Technical Support
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering