Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 8 |
Descriptor
| Computer Security | 11 |
| Performance Technology | 11 |
| Computer System Design | 4 |
| Human Factors Engineering | 4 |
| Information Policy | 4 |
| Case Studies | 3 |
| Computer Networks | 3 |
| Information Management | 3 |
| Information Systems | 3 |
| Information Technology | 3 |
| Performance Factors | 3 |
| More ▼ | |
Source
| Campus Technology | 5 |
| Association for Educational… | 2 |
| Chronicle of Higher Education | 1 |
| Higher Education Studies | 1 |
| Journal of Information… | 1 |
| ProQuest LLC | 1 |
Author
| Archibald, Fred | 1 |
| Crawford, Margaret, Ed. | 1 |
| Edwards, Gregory | 1 |
| Fredette, Michelle | 1 |
| Geng, Lihua | 1 |
| Lei, Kimfong | 1 |
| Lunsford, Dale L. | 1 |
| Ramaswami, Rama | 1 |
| Schaffer, Scott P. | 1 |
| Schaffhauser, Dian | 1 |
| Schmidt, Therese | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 8 |
| Reports - Descriptive | 8 |
| Collected Works - Proceedings | 1 |
| Dissertations/Theses -… | 1 |
| Reports - Evaluative | 1 |
| Speeches/Meeting Papers | 1 |
Education Level
| Higher Education | 8 |
| Postsecondary Education | 2 |
| Adult Education | 1 |
| Elementary Secondary Education | 1 |
Audience
Location
| Asia | 1 |
| United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Fredette, Michelle – Campus Technology, 2013
It's a dangerous world out there, with IT shops hard pressed to protect their institutions and users. "Campus Technology" looks at the 4 biggest security worries--and how IT can fight back. In 2012, 61 educational institutions reported data breaches, involving more than 2 million records, according to
the nonprofit Identity Theft…
Descriptors: Computer Security, Campuses, Information Policy, Information Management
Geng, Lihua – Higher Education Studies, 2011
In the process of textbook management of universities, the flow of storage, collection and check of textbook is quite complicated and daily management flow and system also seriously constrains the efficiency of the management process. Thus, in order to combine the information management model and the traditional management model, it is necessary…
Descriptors: Management Information Systems, Information Management, Database Design, Database Management Systems
Young, Jeffrey R. – Chronicle of Higher Education, 2008
User awareness is growing in importance when it comes to computer security. Not long ago, keeping college networks safe from cyberattackers mainly involved making sure computers around campus had the latest software patches. New computer worms or viruses would pop up, taking advantage of some digital hole in the Windows operating system or in…
Descriptors: Computer Software, Computer Security, Educational Technology, Social Networks
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Schaffhauser, Dian – Campus Technology, 2008
Data loss from life's little power calamities may be the most common form of IT disaster any campus can face. According to a 2007 industry association survey(www.connect.educause.edu/library/ecar/shelterfromthestormitandb/41174), 82 percent of higher education institutions reporting a disruptive occurrence in the five years prior to the study…
Descriptors: Higher Education, Computer Security, Troubleshooting, Technical Support
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Lunsford, Dale L. – Journal of Information Systems Education, 2009
Information systems educators must balance the need to protect the stability, availability, and security of computer laboratories with the learning objectives of various courses. In advanced courses where students need to install, configure, and otherwise manipulate application and operating system settings, this is especially problematic as these…
Descriptors: Advanced Courses, Workstations, Information Systems, Science Process Skills
Lei, Kimfong; Schmidt, Therese; Schaffer, Scott P.; Um, Eun Joon – Association for Educational Communications and Technology, 2004
The American Society for Training and Development (ASTD) defines human performance technology (HPT) as "a systematic approach to analyzing, improving, and managing performance in the workplace through the use of appropriate and varied interventions." The first step in this approach is the performance analysis (Gilbert, 1978). In this…
Descriptors: Program Effectiveness, Graduate Students, Computer Security, Performance Technology
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Simonson, Michael, Ed.; Crawford, Margaret, Ed. – Association for Educational Communications and Technology, 2004
For the twenty-seventh year, the Research and Theory Division of the Association for Educational Communications and Technology (AECT) is sponsoring the publication of these Proceedings. Papers published in this volume were presented at the National AECT Convention in Chicago, Illinois. The Proceedings of AECT's Convention are published in two…
Descriptors: Research and Development, Communications, Educational Technology, Mathematics Instruction

Direct link
Peer reviewed
