Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Networks | 3 |
Computer Security | 3 |
Computers | 3 |
Higher Education | 3 |
Information Technology | 3 |
Internet | 3 |
Privacy | 3 |
Handheld Devices | 2 |
Safety | 2 |
Surveys | 2 |
Telecommunications | 2 |
More ▼ |
Source
Campus Technology | 3 |
Author
Panettieri, Joseph C. | 2 |
Gale, Doug | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Education Level
Higher Education | 3 |
Audience
Location
Ohio | 2 |
Georgia | 1 |
Indiana | 1 |
Massachusetts | 1 |
South Carolina | 1 |
Washington | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security