NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 5 results Save | Export
Association of Governing Boards of Universities and Colleges, 2021
Every year, more news outlets report cybersecurity?breaches--and higher education is not immune from these sinister trends. Cyberattacks on colleges, universities, and foundations have become more frequent, more sophisticated, and more dangerous. Successful cyberattacks can compromise an institution's reputation, result in substantial financial…
Descriptors: Information Security, Higher Education, Governing Boards, Risk
Foerster, Carl A. – ProQuest LLC, 2013
The application of access controls on internal information necessarily impacts the availability of that information for sharing inside the enterprise. The decisions establishing the degree of control are a crucial first step to balance the requirements to protect and share. This research develops a set of basic decision factors and examines other…
Descriptors: Information Technology, Access to Information, Decision Making, Interviews
Shim, Woohyun – ProQuest LLC, 2010
An increasing number of firms rely on highly interconnected information networks. In such environments, defense against cyber attacks is complicated by residual risks caused by the interdependence of information security decisions of firms. IT security is affected not only by a firm's own management strategies but also by those of others. This…
Descriptors: Risk Management, Insurance, Risk, Computer Security
Braun, Linda W.; Martin, Hillias J.; Urquhart, Connie – ALA Editions, 2010
Do we add that edgy urban novel to our teen collection? Should we initiate social networking? What about abandoning Dewey for a bookstore arrangement? Change is risky business, but librarians must be prepared to initiate change to best serve teens. YA (young adult) service innovators Linda W. Braun, Hillias J. Martin, and Connie Urquhart explain…
Descriptors: Library Services, Risk Management, Young Adults, Public Libraries
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks