Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Computer Security | 7 |
Computers | 7 |
Higher Education | 4 |
Privacy | 4 |
Civil Liberties | 2 |
Confidential Records | 2 |
Information Policy | 2 |
Information Technology | 2 |
Laws | 2 |
Legal Responsibility | 2 |
Academic Freedom | 1 |
More ▼ |
Source
Campus Technology | 2 |
Academe: Bulletin of the AAUP | 1 |
Community College Journal | 1 |
EDUCAUSE Quarterly | 1 |
Teacher Librarian | 1 |
Author
Basham, Matt | 1 |
Davida, George I. | 1 |
Demski, Jennifer | 1 |
Garson, G. David | 1 |
Goldsborough, Reid | 1 |
Grush, Mary | 1 |
Nixon, Andrea | 1 |
Publication Type
Opinion Papers | 7 |
Journal Articles | 6 |
Books | 1 |
Information Analyses | 1 |
Education Level
Higher Education | 3 |
Postsecondary Education | 1 |
Audience
Location
California | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Demski, Jennifer – Campus Technology, 2011
The burgeoning consumer-tech market is creating new challenges for higher education IT departments. As increased expectations of mobility and connectivity have students and faculty looking to consumer technology to meet their academic needs, IT must revamp operations and infrastructure to meet the demand, while keeping security risks and budgets…
Descriptors: Information Services, Educational Technology, Technology Integration, Higher Education

Goldsborough, Reid – Teacher Librarian, 2005
According to most surveys, computer manufacturers such as HP puts out reliable products, and computers in general are less troublesome than in the past. But personal computers are still prone to bugs, conflicts, viruses, spyware infestations, hacker and phishing attacks, and--most of all--user error. Unfortunately, technical support from computer…
Descriptors: Computers, Troubleshooting, Computer Security
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security
Basham, Matt – Community College Journal, 2003
Analyzes the impact of the U.S. Patriot Act on educational institutions, particularly in the area of information technology security. Warns that the Act could impact distance learning and campus Internet service providers, and that lawsuits are being filed against universities for having lax cybersecurity. Makes suggestions for dealing with these…
Descriptors: Civil Liberties, Community Colleges, Computer Security, Computers

Davida, George I. – Academe: Bulletin of the AAUP, 1981
The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)
Descriptors: Academic Freedom, Computer Security, Computers, Cryptography
Garson, G. David – 1995
Computing involves social issues and political choices. Issues such as privacy, computer crime, gender inequity, disemployment, and electronic democracy versus "Big Brother" are addressed in the context of efforts to develop a national public policy for information technology. A broad range of research and case studies are examined in an…
Descriptors: Case Studies, Civil Liberties, Computer Security, Computers
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers