NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Young, Jeffrey R. – Chronicle of Higher Education, 2008
The author discusses the gossip Web site Juicy Campus. Although many students express concern that potential employers who see the cite may decline to hire individuals after reading gossip-filled allegations, or that their social lives are in tatters over the mean-spirited, anonymous messages posted about them, because the site has no affiliation…
Descriptors: Publicity, Interpersonal Communication, Internet, Web Sites
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Lipka, Sara – Chronicle of Higher Education, 2009
Colleges have deployed various tactics over the years to deter illegal file sharing, usually of commercial music and movies, by their students. This month, the U.S. Department of Education will begin crafting regulations that specify strategies, a prospect that is making some campus officials wonder if plans they have already invested in will pass…
Descriptors: Music, Industry, Hearings, Copyrights
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Sander, Libby – Chronicle of Higher Education, 2008
After nearly three years of planning, Ohio's higher-education officials are finalizing an ambitious program to grant college credit for some technical courses offered at the state's adult-education centers. The program, called the Career-Technical Credit Transfer, is the latest in a string of state efforts to more closely link work-force training…
Descriptors: Community Colleges, Engineering, Computer Networks, Faculty
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Woo, Stu – Chronicle of Higher Education, 2006
San Jose State University is planning to ban Skype, a popular Internet telephone service, from the campus network because of concerns about security and bandwidth. University administrators say that the technical aspects that make Skype effective also make it dangerous and potentially crippling to a university's network bandwidth. Skype has a…
Descriptors: Foreign Countries, Computer Networks, Computer Security, College Faculty