Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
College Administration | 7 |
Computer Security | 7 |
Information Technology | 7 |
Technology Planning | 7 |
Internet | 5 |
Higher Education | 4 |
Risk | 4 |
Access to Information | 3 |
Compliance (Legal) | 3 |
Computer Software | 3 |
Guidelines | 3 |
More ▼ |
Source
EDUCAUSE Quarterly | 7 |
Author
Bennett, Cedric | 1 |
DeBlois, Peter B. | 1 |
Gray, Terry | 1 |
Oxley, Alan | 1 |
Qayoumi, Mohammad H. | 1 |
Sheard, Reed | 1 |
Spicer, Donald Z. | 1 |
Trappler, Thomas J. | 1 |
Woody, Carol | 1 |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 7 |
Education Level
Higher Education | 7 |
Postsecondary Education | 7 |
Audience
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Sheard, Reed – EDUCAUSE Quarterly, 2010
When the author was brought on as CIO of Westmont College in October 2008, the president, Board of Trustees, and campus environment made it clear that technology needed a major overhaul to meet the college's growing requirements. Also, these changes needed to happen without significantly increasing the IT budget or staff. Marketing Charts…
Descriptors: Problem Solving, Computer Mediated Communication, Educational Finance, Innovation
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Spicer, Donald Z.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2004
This year marks the fifth annual EDUCAUSE Current Issues Survey to identify what campus information technology leaders see as their most critical IT challenges. Thirty-five percent (571) of the 1,638 EDUCAUSE primary member representatives who were asked to participate responded to an e-mail invitation to complete the Web-based survey in December…
Descriptors: Information Technology, Human Resources, Leadership, Higher Education
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy