Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 10 |
Descriptor
Campuses | 16 |
Computer Networks | 16 |
Higher Education | 10 |
Information Technology | 9 |
Computer Security | 6 |
Telecommunications | 6 |
Internet | 5 |
Universities | 4 |
Computers | 3 |
Educational Technology | 3 |
Information Networks | 3 |
More ▼ |
Source
Author
Bristow, Rob | 1 |
Cismaru, Magdalena | 1 |
Cismaru, Romulus | 1 |
Dodds, Ted | 1 |
Ford, Tracy | 1 |
Gale, Doug | 1 |
Gerraughty, James F. | 1 |
Hicks, Mary J. | 1 |
Korzeniowski, Paul | 1 |
Marquardson, Jim | 1 |
Masrek, Mohamad Noorman bin | 1 |
More ▼ |
Publication Type
Journal Articles | 13 |
Reports - Descriptive | 10 |
Reports - Research | 4 |
Opinion Papers | 2 |
Speeches/Meeting Papers | 2 |
Guides - Non-Classroom | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 11 |
Postsecondary Education | 1 |
Audience
Location
Canada | 2 |
Ohio | 2 |
Australia | 1 |
Georgia | 1 |
Netherlands | 1 |
Pennsylvania | 1 |
South Carolina | 1 |
United Kingdom | 1 |
Washington | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Ford, Tracy – Campus Technology, 2012
Many institutions implement a distributed antenna system (DAS) as part of a holistic approach to providing better wireless coverage and capacity on campus. A DAS provides wireless service within a particular area or structure via a network of separate antenna nodes that are connected to a common source through fiber or coaxial cable. Because DAS…
Descriptors: Technology Planning, Information Networks, Systems Development, Computer Networks
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Cismaru, Romulus; Cismaru, Magdalena – Journal of College Teaching & Learning, 2011
Laptop use in class is a characteristic of universities that is changing rapidly. Although much of the attention and research regarding this issue has focused on the debate of whether to impose mandatory laptop programs, the reality of wireless campuses allows students to use their laptops in class for class related and non-class related…
Descriptors: Student Attitudes, Universities, Laptop Computers, Foreign Countries
McDavis, Roderick J. – Chronicle of Higher Education, 2008
Nationwide, IT breaches rose noticeably across all industries from 2003 to 2006. According to national statistics, hackers account for half of all exposures. Physical loss, theft, and fraud represent the second biggest risk. Security is an issue for all of higher education. Of all higher-education records that were exposed between 2000 and 2008, 4…
Descriptors: Higher Education, Information Technology, Computer Security, Risk
Korzeniowski, Paul – Campus Technology, 2008
After starting off as a simple way to provide users with access to internet resources, WiFi networks have evolved to become an important communications cornerstone for a growing number of academic institutions. Not only have colleges been working to make these networks available across their entire campuses (or at least pretty close to 100 percent…
Descriptors: Campuses, Telecommunications, Computer Networks, Communications
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Gerraughty, James F.; Shanafelt, Michael E. – Association of Small Computer Users in Education (ASCUE), 2005
This prototype is a continuation of a series of wireless prototypes which began in August 2001 and was reported on again in August 2002. This is the final year of this prototype. This continuation allowed Saint Francis University's Center of Excellence for Remote and Medically Under-Served Areas (CERMUSA) to refine the existing WLAN for the Saint…
Descriptors: Telecommunications, Computer Networks, Universities, Technology Integration
Masrek, Mohamad Noorman bin – Campus-Wide Information Systems, 2007
Purpose: The purpose of the paper is to evaluate the effectiveness or success of universities' portal implementation from the perspective of students as users. Adopting the model developed by Delone and McLean, portal effectiveness is defined as being composed of information quality, systems quality and service quality. In addition, the paper also…
Descriptors: Student Attitudes, User Satisfaction (Information), Program Effectiveness, Questionnaires

Hicks, Mary J.; Woo, Tony Chi-Hung – Journal of Career Planning and Employment, 1989
Discusses electronic recruiting, a process which enables employers to directly access computerized college student resume information via modem. Addresses such advantages as providing up-to-date student information and alleviating paperwork. Provides an example of this system. (BHK)
Descriptors: Business, Campuses, College Students, Computer Networks
Ricart, Glenn – EDUCOM Review, 1993
Provides technical recommendations for wiring of college campuses to provide for current and future computer network needs, considering wiring in and between existing and new buildings. The effects of trends in networking costs are discussed. The importance of higher education's involvement and influence in various information technology issues is…
Descriptors: Campuses, Computer Networks, Costs, Higher Education
Scott, Steven A. – 1991
This paper reports the results of a study that examined the issues created by implementation of campuswide microcomputer networks in a four-year public institution of higher education, and the perspectives and attitudes from which faculty users and computer center personnel view those issues. Six questions served as the focus of the study: (1) the…
Descriptors: Campuses, Computer Centers, Computer Networks, Higher Education
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Previous Page | Next Page ยป
Pages: 1 | 2