Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Campuses | 3 |
Computer Security | 3 |
Computer Software | 3 |
Higher Education | 2 |
Best Practices | 1 |
College Administration | 1 |
Colleges | 1 |
Compliance (Legal) | 1 |
Computer Networks | 1 |
Computer System Design | 1 |
Cost Effectiveness | 1 |
More ▼ |
Source
Campus Technology | 2 |
EDUCAUSE Review | 1 |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Panettieri, Joseph C. – Campus Technology, 2007
Imagine showing cops and robbers the blueprints to the campus. Then, letting them keep the detailed blueprints to review--over and over again--at their leisure. The robbers would memorize every nuance of the campus layout, and at some point, they'd likely plan a break-in. But on the flip side, the cops would identify security weaknesses--and help…
Descriptors: Campuses, Computer Software, Participative Decision Making, Computer Security