Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 5 |
Guidelines | 5 |
Information Technology | 4 |
Privacy | 4 |
College Administration | 3 |
Educational Policy | 3 |
Technology Planning | 3 |
Compliance (Legal) | 2 |
Confidentiality | 2 |
Foreign Countries | 2 |
Higher Education | 2 |
More ▼ |
Source
EDUCAUSE Quarterly | 5 |
Author
Anderson, Alicia | 1 |
Corn, Michael | 1 |
Oxley, Alan | 1 |
Qayoumi, Mohammad H. | 1 |
Trappler, Thomas J. | 1 |
Woody, Carol | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Education Level
Higher Education | 5 |
Postsecondary Education | 4 |
Audience
Location
California | 1 |
Minnesota | 1 |
United Kingdom (England) | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy