Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 3 |
Descriptor
Author
Bailey, Gerald D. | 1 |
Oxley, Alan | 1 |
Pownell, David | 1 |
Qayoumi, Mohammad H. | 1 |
Smith, Gary | 1 |
Trappler, Thomas J. | 1 |
Villano, Matt | 1 |
Woody, Carol | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 5 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 4 |
Postsecondary Education | 4 |
Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Pownell, David; Bailey, Gerald D. – American School Board Journal, 2001
Handheld computers are just beginning to be introduced in schools. Before adopting the latest innovation, administrators must ask careful questions about issues and implications regarding leadership, teaching and learning, staff development, technology support, planning, infrastructure, safety and security, ethics, evaluation, curriculum, change,…
Descriptors: Administrator Responsibility, Computer Security, Computer Uses in Education, Elementary Secondary Education
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy