NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Zeltser, Lenny – Campus Technology, 2011
Too often, organizations make the mistake of treating malware infections as a series of independent occurrences. Each time a malicious program is discovered, IT simply cleans up or rebuilds the affected host, and then moves on with routine operational tasks. Yet, this approach doesn't allow the institution to keep up with the increasingly…
Descriptors: Computer Security, Computer Software, Workstations, Campuses
Peer reviewed Peer reviewed
PDF on ERIC Download full text
McNabb, Lori – Continuing Higher Education Review, 2010
This article discusses the implementation this year of the Department of Education's Higher Education Opportunity Act of 2008 (HEOA), which requires accreditors to ensure that an institution that offers distance or correspondence education has a process in place to establish that a student who registers in a course or program is also the same…
Descriptors: Distance Education, Higher Education, College Students, Identification
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Aceves, Patricia A.; Aceves, Robert I. – Continuing Higher Education Review, 2009
Since the signing of the Higher Education Opportunity Act (HEOA) in August 2008, providers of distance education courses and programs have been looking into procedures and technologies that will satisfy the accrediting agencies responsible for enforcing the law. Continuing education administrators are at the forefront because of the pervasiveness…
Descriptors: Distance Education, Continuing Education, Higher Education, Educational Legislation
San Nicolas-Rocca, Tonia – ProQuest LLC, 2010
Identification and access management has been among the top security issues facing institutions of higher education. Most institutions of higher education require end users to provide usernames and passwords to gain access to personally identifiable information (PII). This leaves universities vulnerable to unauthorized access and unauthorized…
Descriptors: Higher Education, Action Research, Observation, Identification
Peer reviewed Peer reviewed
Direct linkDirect link
Suess, Jack; Morooney, Kevin – EDUCAUSE Review, 2009
Increasingly, IT organizations will move from providing IT services locally to becoming an integrator of IT services--some provided locally and others provided outside the institution. As a result, institutions must immediately begin to plan for shared services and must understand the essential role that identity management and trust services play…
Descriptors: Higher Education, Internet, Computer Software, Computer Security
Gale, Doug – Campus Technology, 2007
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Descriptors: Computer Security, Prevention, Guidelines, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Agee, Anne Scrivener; Yang, Catherine – EDUCAUSE Review, 2009
This article presents the top-ten IT-related issues in terms of strategic importance to the institution, as revealed by the tenth annual EDUCAUSE Current Issues Survey. These IT-related issues include: (1) Funding IT; (2) Administrative/ERP Information Systems; (3) Security; (4) Infrastructure/Cyberinfrastructure; (5) Teaching and Learning with…
Descriptors: Higher Education, Information Technology, Integrated Learning Systems, Financial Support
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers