Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Security | 3 |
Computers | 3 |
Internet | 3 |
Universities | 3 |
Access to Computers | 2 |
Computer Software | 2 |
Delivery Systems | 2 |
Information Management | 2 |
Information Security | 2 |
Information Storage | 2 |
Information Technology | 2 |
More ▼ |
Source
Journal of Research… | 1 |
ProQuest LLC | 1 |
Author
Isaac Atta Junior Ampofo | 1 |
Isaac Atta Senior Ampofo | 1 |
James Edwin Tippey Jr. | 1 |
Sermersheim, Michael D. | 1 |
Publication Type
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Journal Articles | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Administrators | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Isaac Atta Senior Ampofo; Isaac Atta Junior Ampofo – Journal of Research Initiatives, 2023
The most efficient approach to giving large numbers of students' access to computational resources is through a data center. A contemporary method for building the data center's computer infrastructure is the software-defined model, which enables user tasks to be processed in a reasonable amount of time and at a reasonable cost. The researcher…
Descriptors: Educational Trends, Educational Facilities Design, Access to Computers, Computer Centers
James Edwin Tippey Jr. – ProQuest LLC, 2021
This study explored the training needs of small colleges and universities to adopt cloud computing securely. The purpose of this qualitative phenomenological study was to determine what training would allow the small colleges and universities to deploy cloud computing solutions securely. The research interviewed 10 IT leaders from small colleges…
Descriptors: Small Colleges, Universities, Computer Security, Information Security
Sermersheim, Michael D. – 1998
This pamphlet analyzes some of the legal issues colleges and universities face in regard to faculty and student access to computers and the World Wide Web, evaluates current legal developments, and offers guidelines for developing policies for computer access. It examines sample acceptable-use standards, procedures for suspending or terminating a…
Descriptors: Access to Computers, Civil Liberties, Colleges, Computer Security