Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Computer Software | 3 |
Confidential Records | 3 |
Privacy | 3 |
College Administration | 2 |
Computer Security | 2 |
Data | 2 |
Higher Education | 2 |
Information Technology | 2 |
Compliance (Legal) | 1 |
Computer Storage Devices | 1 |
Computer System Design | 1 |
More ▼ |
Source
EDUCAUSE Quarterly | 2 |
Online | 1 |
Publication Type
Journal Articles | 3 |
Opinion Papers | 2 |
Guides - General | 1 |
Information Analyses | 1 |
Reports - Descriptive | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Location
United States | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Amidon, Paige – Online, 1992
Discusses privacy concerns relating to electronic information media. European privacy initiatives from the European Community are described, including personal data protection, impact on the online industry, and telecommunications privacy; and activities in the United States are examined, including telephone caller privacy, electronic mail…
Descriptors: Computer Software, Confidential Records, Electronic Mail, Foreign Countries
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers