NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy