Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Security | 9 |
Educational Technology | 9 |
Higher Education | 8 |
Internet | 6 |
Information Technology | 5 |
Computer Networks | 4 |
Computer Uses in Education | 3 |
Emergency Programs | 3 |
Web Sites | 3 |
Access to Computers | 2 |
Awards | 2 |
More ▼ |
Source
Campus Technology | 9 |
Author
Demski, Jennifer | 1 |
Gale, Doug | 1 |
Grush, Mary | 1 |
Panettieri, Joseph C. | 1 |
Poremba, Sue Marquette | 1 |
Schaffhauser, Dian | 1 |
Villano, Matt | 1 |
Publication Type
Journal Articles | 9 |
Reports - Descriptive | 7 |
Opinion Papers | 2 |
Education Level
Higher Education | 9 |
Postsecondary Education | 3 |
Audience
Location
Arizona | 1 |
California | 1 |
Georgia | 1 |
Indiana | 1 |
Massachusetts | 1 |
Montana | 1 |
New Jersey | 1 |
Ohio | 1 |
Pennsylvania | 1 |
South Carolina | 1 |
Texas | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Poremba, Sue Marquette – Campus Technology, 2012
Who hasn't received mail from a company notifying them that their personal information may have been compromised? No organization--not Amazon, not the CIA--is immune to cyberattacks, and higher education is no exception. Indeed, colleges and universities may be even more susceptible to security breaches than their corporate brethren, and the…
Descriptors: Higher Education, Access to Computers, Computer Security, Safety
Demski, Jennifer – Campus Technology, 2011
The burgeoning consumer-tech market is creating new challenges for higher education IT departments. As increased expectations of mobility and connectivity have students and faculty looking to consumer technology to meet their academic needs, IT must revamp operations and infrastructure to meet the demand, while keeping security risks and budgets…
Descriptors: Information Services, Educational Technology, Technology Integration, Higher Education
Villano, Matt – Campus Technology, 2009
Academic technologists at Lynn University (Florida) learned the hard way just how important a disaster recovery plan can be. Back in 2005, when Hurricane Wilma walloped the region with driving rain and 120 mile-per-hour winds, the storm debilitated Lynn's IT department, causing damage and flooding that thwarted the campus network for nearly two…
Descriptors: Emergency Programs, Educational Technology, Information Technology, Internet
Grush, Mary – Campus Technology, 2009
As colleges and universities rely more heavily on software as a service (SaaS), they're putting more critical data in the cloud. What are the security issues, and how are cloud providers responding? "Campus Technology" ("CT") went to three higher ed SaaS vendors--Google, IBM, and TopSchool--and asked them to share their thoughts about the state of…
Descriptors: Higher Education, Computer Software, Educational Technology, Computer Uses in Education
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
There's no silver bullet to information security; universities must continue to keep their antivirus, anti-spyware, firewall, and patch management systems in good working order. These days, the largest target for hackers appears to be university databases. Now, universities are searching for new solutions to safeguard those systems. This article…
Descriptors: Databases, Best Practices, Higher Education, Technology Planning
Campus Technology, 2007
This article profiles the winners of this year's competition for outstanding technology innovation on US college and university campuses. The winners are: (1) Rice University, Texas (virtualized networks); (2) Drexel University, Pennsylvania (rich media); (3) Harvard Business School, Massachusetts (network management); (4) Louisiana State…
Descriptors: Educational Innovation, Awards, Emergency Programs, Higher Education
Campus Technology, 2008
This article features the 14 winners of the 2008 Campus Technology Innovators. This article offers an insider's view of the winners' campus technology initiatives, their project leads, and vendor partners jointly recognized for a unique ability to advance teaching, learning, administration, and operation on North American college and university…
Descriptors: Emergency Programs, Computer Uses in Education, Educational Innovation, Higher Education