Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 2 |
| Computers | 2 |
| Interviews | 2 |
| Administrative Organization | 1 |
| Audits (Verification) | 1 |
| College Students | 1 |
| Colleges | 1 |
| Confidential Records | 1 |
| Evaluation Methods | 1 |
| Faculty | 1 |
| Higher Education | 1 |
| More ▼ | |
Author
| Grush, Mary | 1 |
| Young, Jeffrey R. | 1 |
Publication Type
| Journal Articles | 2 |
| Opinion Papers | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 2 |
Audience
Location
| California | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Young, Jeffrey R. – Education Digest: Essential Readings Condensed for Quick Review, 2009
In this article, the author presents the top-10 list of campus computer-security risks he compiled based on several recent computing surveys and interviews with more than a dozen college-technology leaders. The list, ordered from least to most serious, is by no means scientific, but it gives a sense of where today's battle lines are--and why…
Descriptors: Computer Security, Computers, Social Networks, Evaluation Methods
Grush, Mary – Campus Technology, 2007
Despite intensive security measures, institutions are still suffering breaches--sometimes quite painful and costly ones. After a major breach was reported at UCLA this past November, the author spoke with "Educause" security expert Rodney Petersen, to get his perspective and advice for higher education leadership. This article presents…
Descriptors: Higher Education, Colleges, School Security, Computer Security

Direct link
