NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Allison, Debra H.; DeBlois, Peter B. – EDUCAUSE Review, 2008
EDUCAUSE presents the top-ten IT-related issues in terms of strategic importance to the higher education institution, as revealed by the ninth annual EDUCAUSE Current Issues Survey. This year, "Security" moves back to the top of the list. (Contains 20 notes.)
Descriptors: Higher Education, Educational Technology, Computer Uses in Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Luker, Mark A. – EDUCAUSE Review, 2005
Kenneth J. Klingenstein, Chief Technologist at the University of Colorado, Boulder, and Project Director of the Internet2 Middleware Initiative, is the recipient of the 2003 EDUCAUSE Award for Leadership in Information Technologies. Klingenstein has been involved in computing technology for almost three decades. One of a handful of leaders who…
Descriptors: Educational Technology, Information Technology, Distance Education, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security