Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
Chronicle of Higher Education | 65 |
Author
Publication Type
Journal Articles | 64 |
Reports - Descriptive | 57 |
Collected Works - Serial | 4 |
Reports - General | 3 |
Education Level
Higher Education | 13 |
Postsecondary Education | 2 |
Two Year Colleges | 1 |
Audience
Administrators | 4 |
Teachers | 4 |
Location
Ohio | 3 |
California | 2 |
Indiana | 2 |
New Mexico | 2 |
Canada | 1 |
China | 1 |
Croatia | 1 |
Georgia | 1 |
Illinois | 1 |
Maryland | 1 |
Mexico | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
New, Jake – Chronicle of Higher Education, 2013
Inside campus libraries and dormitory rooms, thousands of students connect to the Internet not only to study with online systems like Blackboard but also to watch movies and TV shows on Netflix. Computers, smartphones, wireless printers, tablets, iPods, Xboxes, handheld gaming systems, e-readers, smart TVs, Blu-ray players--students now bring an…
Descriptors: College Students, College Faculty, Computer Use, Information Technology
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Young, Jeffrey R. – Chronicle of Higher Education, 2008
The author discusses the gossip Web site Juicy Campus. Although many students express concern that potential employers who see the cite may decline to hire individuals after reading gossip-filled allegations, or that their social lives are in tatters over the mean-spirited, anonymous messages posted about them, because the site has no affiliation…
Descriptors: Publicity, Interpersonal Communication, Internet, Web Sites
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Lipka, Sara – Chronicle of Higher Education, 2009
Colleges have deployed various tactics over the years to deter illegal file sharing, usually of commercial music and movies, by their students. This month, the U.S. Department of Education will begin crafting regulations that specify strategies, a prospect that is making some campus officials wonder if plans they have already invested in will pass…
Descriptors: Music, Industry, Hearings, Copyrights
Read, Brock – Chronicle of Higher Education, 2007
This article reports on a monitoring project commenced by the campus-network officials at Illinois State University that shows that the campus network is a haven for illegal activity. In an effort to bridge the divide between the university and the entertainment industry, Illinois State designed an unorthodox research program to give a detailed…
Descriptors: Student Attitudes, Copyrights, Popular Culture, Student Surveys
Sander, Libby – Chronicle of Higher Education, 2008
After nearly three years of planning, Ohio's higher-education officials are finalizing an ambitious program to grant college credit for some technical courses offered at the state's adult-education centers. The program, called the Career-Technical Credit Transfer, is the latest in a string of state efforts to more closely link work-force training…
Descriptors: Community Colleges, Engineering, Computer Networks, Faculty
Carlson, Scott – Chronicle of Higher Education, 2001
Colleges are finding that, regardless of the court rulings against Napster, file-sharing services remain popular with students and problematic to campus networks because of the demand placed on bandwidth by music and video files. (EV)
Descriptors: Colleges, Computer Networks, Downloading, Online Systems
Olsen, Florence – Chronicle of Higher Education, 2002
Discusses how colleges are struggling with an increasing number of attacks on their computer systems; as attacks increase, they face tough, expensive challenges in keeping intruders out. (EV)
Descriptors: Computer Networks, Computer Security, Computers, Crime
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Olsen, Florence – Chronicle of Higher Education, 2003
Describes how California's Peralta Community Colleges District decided to hire an outside company to manage its computer networks, but that problems cause it to now want a technology boss on its own staff. (EV)
Descriptors: Computer Networks, Computer Uses in Education, Information Technology, Problems
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention
Foster, Andrea L. – Chronicle of Higher Education, 2005
U.S. Supreme Court justices struggled in a lively debate with how to balance the competing interests of the entertainment industry and developers of file-sharing technology. Some justices sharply questioned whether it was fair to hold inventors of a distribution technology liable for copyright infringement, while others suggested that it was wrong…
Descriptors: Copyrights, Computer Networks, Court Litigation, Hearings
Turner, Judith Axler – Chronicle of Higher Education, 1988
Many suggestions by two researchers at Rand Corporation, who published a paper on etiquette for news networks, have been incorporated into bulletin-board conventions, but with new users coming online all the time socialization is slow. Some suggestions for e-mail users are provided. (MLW)
Descriptors: Bulletin Boards, Communications, Computer Networks, Electronic Mail
Olsen, Florence – Chronicle of Higher Education, 2003
Describes how colleges are taking advantage of bargains on fiber-optic lines to build regional computer networks; some envision a national network for academe. (EV)
Descriptors: Computer Networks, Computer Uses in Education, Higher Education, Information Technology