Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Networks | 5 |
| Computer Security | 5 |
| Guidelines | 5 |
| Higher Education | 4 |
| Computer System Design | 2 |
| Confidentiality | 2 |
| Information Systems | 2 |
| Information Technology | 2 |
| Internet | 2 |
| Legal Responsibility | 2 |
| Policy Formation | 2 |
| More ▼ | |
Source
| Campus Technology | 1 |
| EDUCAUSE Quarterly | 1 |
| EDUCAUSE Review | 1 |
| Illinois Libraries | 1 |
| Journal of Instruction… | 1 |
Author
| Littman, Marlyn Kemper | 1 |
| Qayoumi, Mohammad H. | 1 |
| Uhler, Scott F. | 1 |
| Villano, Matt | 1 |
| Voloudakis, John | 1 |
| Weiss, Philippe R. | 1 |
| Woody, Carol | 1 |
Publication Type
| Journal Articles | 5 |
| Reports - Descriptive | 5 |
| Information Analyses | 1 |
Education Level
| Higher Education | 3 |
| Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
Uhler, Scott F.; Weiss, Philippe R. – Illinois Libraries, 1996
With the 1996 defeat of the Communications Decency Act, under which providing offensive material on computer systems accessible to children would have become a felony, no legal guidelines exist for library use of the Internet. Libraries can avoid becoming the center of an Internet controversy by encouraging parental involvement; by protecting…
Descriptors: Access to Information, Censorship, Child Welfare, Computer Networks
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy

Direct link
Peer reviewed
