Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 7 |
Descriptor
Source
Author
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 9 |
Reports - Research | 3 |
Speeches/Meeting Papers | 2 |
Dissertations/Theses -… | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Yang, Shuo; Paul, Shubhra Deb; Bhunia, Swarup – Advances in Engineering Education, 2021
Hardware security is one of the most researched areas in the field of security. It focuses on discovering and understanding attacks and countermeasures for electronic hardware that provides the "root-of-trust" for modern computing systems upon which the software stack is built. The increasing reliance on electronic devices in our…
Descriptors: Engineering Education, Computer Science Education, Computer Security, Information Security
Readiness and Emergency Management for Schools Technical Assistance Center (REMS), 2017
The ability to securely connect to virtual systems is an important element within a safe and supportive learning environment. This is particularly the case within institutions of higher education (IHEs), where students are increasingly learning in digital formats; faculty, staff, and visitors are constantly accessing and sharing information…
Descriptors: Computer Security, Information Security, Higher Education, Universities
Debiec, Piotr; Materka, Andrzej – International Journal of Information and Learning Technology, 2015
Purpose: This paper presents an IT system -- Student Connectivity Module (SCM) -- designed to support administration of student exchange between universities in different countries, developed under the EU seventh Framework Program. The purpose of this paper is to share the acquired knowledge on existing difficulties in mobility management, propose…
Descriptors: Information Technology, Student Mobility, International Educational Exchange, Universities
Miseviciene, Regina; Ambraziene, Danute; Tuminauskas, Raimundas; Pažereckas, Nerijus – Informatics in Education, 2012
Many factors influence education nowadays. Educational institutions are faced with budget cuttings, outdated IT, data security management and the willingness to integrate remote learning at home. Virtualization technologies provide innovative solutions to the problems. The paper presents an original educational infrastructure using virtualization…
Descriptors: Computer Simulation, Universities, College Students, College Faculty
Workman, Sue; Childs, Melody; Causey, Jim; Moberly, Brent; Fitzpatrick, Christine – EDUCAUSE Quarterly, 2006
At the beginning of an academic year, thousands of students move into campus housing on Indiana University's Bloomington and Indianapolis campuses within a three-day period, and more than 96 percent arrive with at least one personal computer (and possibly also a PDA, cell phone, and gaming system), and most expect to connect to the campus network…
Descriptors: Computer Networks, Student Personnel Services, Information Technology, Computer Security
Olsen, Florence – Chronicle of Higher Education, 2000
A new study identifies and ranks the 10 security gaps responsible for most outsider attacks on college computer networks. The list is intended to help campus system administrators establish priorities as they work to increase security. One network security expert urges that institutions utilize multiple security layers. (DB)
Descriptors: Colleges, Computer Networks, Computer Security, Crime Prevention
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Littman, Marlyn K. – HyperNexus, 1997
The pervasive use of communication technology in schools and universities requires increased security to safeguard information confidentiality, integrity, availability, utility, and authenticity. This article, the first of two, examines procedures for implementing security policy, techniques for minimizing vulnerability, and techniques for…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer System Design
Littman, Marlyn Kemper – Journal of Online Learning, 1998
Explores capabilities of extranets (collaborative information networks between partner institutions) from the perspective of the school and university environment. Introduces distinctive features. Presents strategies and techniques for facilitating the extranet design and implementation process and delineates tactics for safeguarding extranets…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Computer System Design
CAUSE, Boulder, CO. – 1996
Eight papers are presented from the 1995 CAUSE conference track on client/server issues faced by managers of information technology at colleges and universities. The papers include: (1) "The Realities of Client/Server Development and Implementation" (Mary Ann Carr and Alan Hartwig), which examines Carnegie Mellon University's transition…
Descriptors: Colleges, Computer Networks, Computer Security, Computer System Design
CAUSE, Boulder, CO. – 1996
Seven papers and one abstract of a paper are presented from the 1995 CAUSE conference track on policies and standards issues faced by managers of information technology at colleges and universities. The papers include: (1) "University/College Information System Structures and Policies: Do They Make a Difference? An Initial Assessment"…
Descriptors: Access to Information, Colleges, Computer Networks, Computer Security