Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 5 |
Descriptor
Author
Beer, Robert | 1 |
Hawkins, Brian L. | 1 |
Hughes, Joy R. | 1 |
Olsen, Florence | 1 |
Poremba, Sue Marquette | 1 |
Rudy, Julia A. | 1 |
Villano, Matt | 1 |
Young, Jeffrey R. | 1 |
Publication Type
Reports - Descriptive | 8 |
Journal Articles | 5 |
Speeches/Meeting Papers | 2 |
Numerical/Quantitative Data | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 5 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Poremba, Sue Marquette – Campus Technology, 2012
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Descriptors: Higher Education, Access to Computers, Computer Security, Safety
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Villano, Matt – Campus Technology, 2009
Academic technologists at Lynn University (Florida) learned the hard way just how important a disaster recovery plan can be. Back in 2005, when Hurricane Wilma walloped the region with driving rain and 120 mile-per-hour winds, the storm debilitated Lynn's IT department, causing damage and flooding that thwarted the campus network for nearly two…
Descriptors: Emergency Programs, Educational Technology, Information Technology, Internet
Hughes, Joy R.; Beer, Robert – EDUCAUSE Quarterly, 2007
The EDUCAUSE/Internet2 Computer and Network Security Task Force consulted with IT security professionals on campus about concerns with the current state of security in enterprise resource planning (ERP) systems. From these conversations, it was clear that security issues generally fell into one of two areas: (1) It has become extremely difficult…
Descriptors: Check Lists, Higher Education, Certification, Guidance
Hawkins, Brian L.; Rudy, Julia A. – EDUCAUSE, 2008
EDUCAUSE Core Data Service Fiscal Year 2007 Summary Report summarizes much of the data collected through the 2007 EDUCAUSE core data survey about campus information technology (IT) environments at 994 colleges and universities in the U.S. and abroad. The report presents aggregates of data through more than 100 tables and accompanying descriptive…
Descriptors: Higher Education, Information Systems, Information Technology, Classification
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention
CAUSE, Boulder, CO. – 1996
Eight papers are presented from the 1995 CAUSE conference track on client/server issues faced by managers of information technology at colleges and universities. The papers include: (1) "The Realities of Client/Server Development and Implementation" (Mary Ann Carr and Alan Hartwig), which examines Carnegie Mellon University's transition…
Descriptors: Colleges, Computer Networks, Computer Security, Computer System Design
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security