Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 1 |
| Since 2007 (last 20 years) | 5 |
Descriptor
| Administrative Policy | 7 |
| Computer Security | 7 |
| Information Technology | 4 |
| Computer Uses in Education | 3 |
| Federal Legislation | 3 |
| Higher Education | 3 |
| Student Behavior | 3 |
| Computer Networks | 2 |
| Crime | 2 |
| Emergency Programs | 2 |
| Information Security | 2 |
| More ▼ | |
Source
| ProQuest LLC | 3 |
| Charles C. Thomas, Publisher,… | 1 |
| Chronicle of Higher Education | 1 |
| EDUCAUSE Quarterly | 1 |
| EDUCAUSE Review | 1 |
Author
| Anderson, Alicia | 1 |
| Bennett, Jeannine B. | 1 |
| Enyeart, Mike | 1 |
| Fisher, Bonnie S., Ed. | 1 |
| McCollum, Kelly | 1 |
| Mekdeci, Kelly Broyles | 1 |
| Reiss, Jeffrey | 1 |
| Sloan, John J., III, Ed. | 1 |
| Staman, E. Michael | 1 |
| Valdes, Jose J., Jr. | 1 |
Publication Type
| Dissertations/Theses -… | 3 |
| Journal Articles | 3 |
| Reports - Descriptive | 3 |
| Books | 1 |
| Collected Works - General | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 4 |
| Elementary Secondary Education | 1 |
Audience
Location
| South America | 1 |
| United States | 1 |
Laws, Policies, & Programs
| Digital Millennium Copyright… | 1 |
| Family Educational Rights and… | 1 |
| Higher Education Act Title IX | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Fisher, Bonnie S., Ed.; Sloan, John J., III, Ed. – Charles C. Thomas, Publisher, Ltd, 2022
This new edition of "Campus Crime" shares with readers the advancements that have been made in understanding campus crime. Across the three sections of the book, chapters review changes while also addressing current -- and even future -- crime and security issues confronting institutions of higher education. Some of these chapters…
Descriptors: Crime, Higher Education, Victims of Crime, Sexual Abuse
Bennett, Jeannine B. – ProQuest LLC, 2012
This study addressed the problems associated with users' understanding, accepting, and complying with requirements of security-oriented solutions. The goal of the research was not to dispute existing theory on IT project implementations, but rather to further the knowledge on the topic of technology user acceptance of security-oriented IT…
Descriptors: Information Technology, Information Security, Change Strategies, Online Surveys
Reiss, Jeffrey – ProQuest LLC, 2010
Digital piracy is a problem that may never disappear from society. Through readily available resources such as those found in a university, students will always have access to illegal goods. While piracy is a global phenomenon, an institution's resources combined with the typical college student's lack of funds makes it more lucrative. Students…
Descriptors: Copyrights, Computer Software, Corporations, Ethics
Mekdeci, Kelly Broyles – ProQuest LLC, 2011
United States schools and American Overseas (A/OS) schools depend upon educational technology (ET) to support business operations and student learning experiences. Schools rely upon administrative software, on-line course modules, information databases, digital communications systems, and many other ET processes. However, ET's fragility compared…
Descriptors: Foreign Countries, Educational Technology, Computer Uses in Education, Institutional Mission
Enyeart, Mike; Staman, E. Michael; Valdes, Jose J., Jr. – EDUCAUSE Review, 2007
The concept of convergence has evolved significantly during recent years. Today, "convergence" refers to the integration of the communications and computing resources and services that seamlessly traverse multiple infrastructures and deliver content to multiple platforms or appliances. Convergence is real. Those in higher education, and especially…
Descriptors: Educational Opportunities, Higher Education, Educational Trends, Surveys
McCollum, Kelly – Chronicle of Higher Education, 1999
Colleges and universities are finding that ways to misbehave in computer-mediated communication come along faster than institutions can create policies to deal with them. Although most schools have acceptable-use policies, technological advances change the environment quickly and require flexible policies. Most institutions have created a mix of…
Descriptors: Administrative Policy, Computer Mediated Communication, Computer Networks, Computer Security
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security

Direct link
Peer reviewed
