NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Jackson, Robert; Frolick, Mark N. – Educause Quarterly, 2003
Studied a server security breach at the University of Memphis, Tennessee, to highlight personnel roles, detection of the compromised server, policy enforcement, forensics, and the proactive search for other servers threatened in the same way. (SLD)
Descriptors: Computer Security, Computer Uses in Education, Crime, Educational Policy
Peer reviewed Peer reviewed
Bruhn, Mark; Gettes, Michael; West, Ann – Educause Quarterly, 2003
Discusses the drivers for an identity management system (IdM), components of this system, and its role within a school security strategy, focusing on: basic access management; requirements for access management; middleware support for an access management system; IdM implementation considerations (e.g., access eligibilities, authentication…
Descriptors: Computer Security, Computer Uses in Education, Educational Technology, Elementary Secondary Education
Peer reviewed Peer reviewed
Kobulnicky, Paul; Rudy, Julia A. – Educause Quarterly, 2002
An annual survey to determine pressing campus information technology (IT) challenges revealed that campus IT staffing challenges have eased, while security management has emerged as an issue of strategic importance. Numerous other findings were also gathered. (EV)
Descriptors: Computer Security, Computer Uses in Education, Environmental Scanning, Higher Education
Peer reviewed Peer reviewed
Payne, Shirley – Educause Quarterly, 2003
Discusses how to develop effective security education and awareness programs to help the wide and varied groups of people on campuses understand their role in campus security, examining: target audiences (e.g., students, parents, faculty, researchers, and administrators); effective delivery methods (e.g., online quizzes, handbooks, and videos);…
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Educational Technology