Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
College Administration | 6 |
Computer Networks | 6 |
Computer Security | 6 |
Higher Education | 4 |
Information Systems | 4 |
Information Technology | 4 |
College Faculty | 2 |
Computer System Design | 2 |
Foreign Countries | 2 |
Program Implementation | 2 |
Technology Planning | 2 |
More ▼ |
Source
CAUSE/EFFECT | 1 |
Chronicle of Higher Education | 1 |
EDUCAUSE | 1 |
EDUCAUSE Quarterly | 1 |
EDUCAUSE Review | 1 |
ProQuest LLC | 1 |
Author
Agee, Anne Scrivener | 1 |
Bernbom, Gerald | 1 |
Elhindi, Mohamed A. | 1 |
Hawkins, Brian L. | 1 |
Qayoumi, Mohammad H. | 1 |
Rudy, Julia A. | 1 |
Woo, Stu | 1 |
Woody, Carol | 1 |
Yang, Catherine | 1 |
Publication Type
Reports - Descriptive | 5 |
Journal Articles | 4 |
Dissertations/Theses -… | 1 |
Numerical/Quantitative Data | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 3 |
Audience
Location
California | 1 |
Minnesota | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Elhindi, Mohamed A. – ProQuest LLC, 2010
Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…
Descriptors: Credentials, State Colleges, Models, Information Systems
Agee, Anne Scrivener; Yang, Catherine – EDUCAUSE Review, 2009
This article presents the top-ten IT-related issues in terms of strategic importance to the institution, as revealed by the tenth annual EDUCAUSE Current Issues Survey. These IT-related issues include: (1) Funding IT; (2) Administrative/ERP Information Systems; (3) Security; (4) Infrastructure/Cyberinfrastructure; (5) Teaching and Learning with…
Descriptors: Higher Education, Information Technology, Integrated Learning Systems, Financial Support
Woo, Stu – Chronicle of Higher Education, 2006
San Jose State University is planning to ban Skype, a popular Internet telephone service, from the campus network because of concerns about security and bandwidth. University administrators say that the technical aspects that make Skype effective also make it dangerous and potentially crippling to a university's network bandwidth. Skype has a…
Descriptors: Foreign Countries, Computer Networks, Computer Security, College Faculty
Bernbom, Gerald; And Others – CAUSE/EFFECT, 1994
Faced with the challenge of providing security across a complex, multiprotocol institutional information network, computing services at Indiana University implemented a responsive, collaborative security architecture designed for the future. Information systems design, security principles and strategy, and implementation are described. (Author/MSE)
Descriptors: Access to Information, College Administration, Computer Networks, Computer Oriented Programs
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2007
EDUCAUSE Core Data Service Fiscal Year 2006 Summary Report summarizes much of the data collected through the 2006 EDUCAUSE core data survey about campus information technology (IT) environments at 933 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy