Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Networks | 5 |
Computer Security | 5 |
School Security | 5 |
Higher Education | 3 |
Crime Prevention | 2 |
Agency Cooperation | 1 |
Best Practices | 1 |
Codes of Ethics | 1 |
Computer Uses in Education | 1 |
Confidentiality | 1 |
Convergent Thinking | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 1 |
Audience
Location
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Enderle, Jerry – School Planning & Management, 2003
Discusses issues of security for school computer networks, including protection against viruses and hackers. (EV)
Descriptors: Computer Networks, Computer Security, School Security

Payne, Shirley – Educause Quarterly, 2003
Discusses how to develop effective security education and awareness programs to help the wide and varied groups of people on campuses understand their role in campus security, examining: target audiences (e.g., students, parents, faculty, researchers, and administrators); effective delivery methods (e.g., online quizzes, handbooks, and videos);…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality