Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 2 |
Computer Software | 2 |
Access to Computers | 1 |
Campuses | 1 |
College Administration | 1 |
Colleges | 1 |
Compliance (Legal) | 1 |
Computer Networks | 1 |
Confidentiality | 1 |
Handheld Devices | 1 |
Higher Education | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Location
Kansas | 2 |
Illinois | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Sendze, Monique – Computers in Libraries, 2006
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Descriptors: Workstations, Public Libraries, Library Services, Library Role