NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 13 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Peer reviewed Peer reviewed
Direct linkDirect link
Pierce, Dennis – Community College Journal, 2017
The universe of objects containing microprocessors or embedded sensors capable of communicating and transmitting information across networks is called the Internet of Things, and it has enormous implications for community colleges. Already, many colleges are saving time and money by monitoring and controlling "smart building" features…
Descriptors: Community Colleges, Internet, Educational Technology, Technology Uses in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Patton, Madeline – Community College Journal, 2015
Data breach prevention is a battle, rarely plain and never simple. For higher education institutions, the Sisyphean aspects of the task are more complex than for industry and business. Two-year colleges have payrolls and vendor contracts like those enterprises. They also have public record and student confidentiality requirements. Colleges must…
Descriptors: Disclosure, Computer Security, Confidential Records, Confidentiality
Peer reviewed Peer reviewed
Direct linkDirect link
Wong, Wylie – Community College Journal, 2015
Community colleges are using grants and workforce partnerships to train a new generation of technology workers. In September, the Obama administration awarded $450 million in grants to nearly 270 community colleges that have partnered with more than 400 employers nationally. It was the final installment of a four-year, $2 billion competitive grant…
Descriptors: Community Colleges, Two Year Colleges, Higher Education, Partnerships in Education
Peer reviewed Peer reviewed
Direct linkDirect link
Brobst, Jan; Council, Chip – Community College Journal, 2005
The discussion in this article is intended to provide an examination of why top management, IT management, and internal auditors should be interested in IT governance. Some aspects of IT management will be described including implementation, auditing, availability, security, and alignment. One governance framework, COBIT, will be utilized as a…
Descriptors: Audits (Verification), Information Technology, Administration, Governance
Peer reviewed Peer reviewed
Direct linkDirect link
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Basham, Matt – Community College Journal, 2003
Analyzes the impact of the U.S. Patriot Act on educational institutions, particularly in the area of information technology security. Warns that the Act could impact distance learning and campus Internet service providers, and that lawsuits are being filed against universities for having lax cybersecurity. Makes suggestions for dealing with these…
Descriptors: Civil Liberties, Community Colleges, Computer Security, Computers
Peer reviewed Peer reviewed
Direct linkDirect link
Gamble, Cheryl – Community College Journal, 2005
The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…
Descriptors: Technological Advancement, National Security, Security (Psychology), Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Gamble, Cheryl – Community College Journal, 2002
Explains the technology of biometrics, the science of identifying a person by unique physical characteristics, and its application in the fight against terrorism. Argues that biometrics, such as hand readers, fingerprint readers, and eye scans, are reliable and efficient. Also describes proximity cards, digital tracking systems, and smart cards.…
Descriptors: Biology, Community Colleges, Computer Security, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Teles, Elizabeth J.; Hovis, R. Corby – Community College Journal, 2002
Describes recent federal legislation (H.R. 3394) that charges the National Science Foundation with offering more grants to colleges and universities for degree programs in computer and network security, and to establish trainee programs for graduate students who pursue doctoral degrees in computer and network security. Discusses aspects of…
Descriptors: College Role, Community Colleges, Computer Security, Crime
Peer reviewed Peer reviewed
Direct linkDirect link
Johnson, Elaine A. – Community College Journal, 2002
Describes Bio-Link, the Advanced Technological Education (ATE) Center for Biotechnology established with funding from the National Science Foundation (NSF). Reports that Bio-Link, headquartered at City College of San Francisco, has created a national network and resource base for community colleges, industry, and others interested in biotechnology…
Descriptors: Biology, Biotechnology, Community Colleges, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Schmidt, Howard – Community College Journal, 2002
Outlines the U.S. Critical Infrastructure Protection Board's purpose, budget, principles, and priorities. Describes the board's role in coordinating all federal activities related to protection of information systems and networks supporting critical infrastructures. Also discusses its responsibility in creating a policy and road map for government…
Descriptors: Community Colleges, Computer Security, Crime, Emergency Programs
Peer reviewed Peer reviewed
Direct linkDirect link
Blezard, Rob – Community College Journal, 2002
Discusses ways in which community colleges are lending their expertise and experience to help make the nation safer after the September 11th attacks. Reports that community colleges are instituting public safety and cybersecurity measures on their campuses and teaching others to do the same. Adds that community colleges are also training public…
Descriptors: College Role, Community Colleges, Computer Security, Crime