Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Networks | 5 |
Computer Security | 5 |
Program Descriptions | 5 |
Information Technology | 3 |
Computer System Design | 2 |
Educational Technology | 2 |
Higher Education | 2 |
Internet | 2 |
Academic Advising | 1 |
Access to Information | 1 |
Administrator Attitudes | 1 |
More ▼ |
Source
CAUSE/EFFECT | 1 |
Campus Technology | 1 |
EDUCAUSE Quarterly | 1 |
Journal of Information… | 1 |
Journal of Information… | 1 |
Author
Bernbom, Gerald | 1 |
Burd, Stephen D. | 1 |
Cantor, Scott | 1 |
Carmody, Steven | 1 |
Conway, Christopher | 1 |
Hoehn, Walter | 1 |
Klingenstein, Ken | 1 |
Marquardson, Jim | 1 |
Morgan, R. L. | 1 |
Seazzu, Alessandro F. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 3 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Marquardson, Jim – Journal of Information Systems Education, 2022
Employers want applicants with experience, even for entry-level cybersecurity roles. Universities traditionally help students gain cybersecurity experience by hiring them for on-campus jobs or by matching job seekers to employers for off-campus work. A third option is described in this paper in which universities bring external companies on…
Descriptors: Information Science Education, Information Security, Campuses, Computer Security
Burd, Stephen D.; Seazzu, Alessandro F.; Conway, Christopher – Journal of Information Technology Education, 2009
Current technology enables schools to provide remote or virtual computing labs that can be implemented in multiple ways ranging from remote access to banks of dedicated workstations to sophisticated access to large-scale servers hosting virtualized workstations. This paper reports on the implementation of a specific lab using remote access to…
Descriptors: Workstations, Educational Technology, Computer System Design, Computer Networks
Morgan, R. L.; Cantor, Scott; Carmody, Steven; Hoehn, Walter; Klingenstein, Ken – EDUCAUSE Quarterly, 2004
The Fifth Annual Educause Current Issues Survey ranked "security and identity management" near the top of the list of critical IT challenges on campus today. Recognition of the crucial importance of securing networked resources led Internet2 to establish its Middleware Initiative (I2MI) in 1999. While Internet2 was founded to develop and deploy…
Descriptors: Internet, Computer Security, Computer Networks, Information Technology
Campus Technology, 2008
This article features the 14 winners of the 2008 Campus Technology Innovators. This article offers an insider's view of the winners' campus technology initiatives, their project leads, and vendor partners jointly recognized for a unique ability to advance teaching, learning, administration, and operation on North American college and university…
Descriptors: Emergency Programs, Computer Uses in Education, Educational Innovation, Higher Education
Bernbom, Gerald; And Others – CAUSE/EFFECT, 1994
Faced with the challenge of providing security across a complex, multiprotocol institutional information network, computing services at Indiana University implemented a responsive, collaborative security architecture designed for the future. Information systems design, security principles and strategy, and implementation are described. (Author/MSE)
Descriptors: Access to Information, College Administration, Computer Networks, Computer Oriented Programs