Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 8 |
Higher Education | 8 |
Information Policy | 8 |
Barriers | 3 |
Confidentiality | 3 |
Crime Prevention | 3 |
Information Technology | 3 |
Privacy | 3 |
Student Records | 3 |
College Administration | 2 |
Compliance (Legal) | 2 |
More ▼ |
Source
Chronicle of Higher Education | 2 |
CURRENTS | 1 |
Campus Technology | 1 |
EDUCAUSE Quarterly | 1 |
EDUCAUSE Review | 1 |
ProQuest LLC | 1 |
Author
Anderson, John A. | 1 |
Basken, Paul | 1 |
Guernsey, Lisa | 1 |
Hart, Kevin | 1 |
Lavagnino, Merri Beth | 1 |
Matt Paulson | 1 |
Nixon, Andrea | 1 |
Villano, Matt | 1 |
Publication Type
Journal Articles | 6 |
Reports - Descriptive | 5 |
Dissertations/Theses -… | 1 |
Opinion Papers | 1 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 7 |
Postsecondary Education | 3 |
Audience
Location
Massachusetts | 2 |
District of Columbia | 1 |
Maryland | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Matt Paulson – ProQuest LLC, 2021
With the recent proliferation of information technology, almost all users of technology, no matter the field, profession, or status, have experienced a commensurate increase in information security threats. This, in turn, creates a significant concern in higher institutions of public learning. Information Security Officers in public higher…
Descriptors: Higher Education, Information Security, Computer Security, Information Policy
Lavagnino, Merri Beth – EDUCAUSE Review, 2013
Why is Information Privacy the focus of the January-February 2013 issue of "EDUCAUSE Review" and "EDUCAUSE Review Online"? Results from the 2012 annual survey of the International Association of Privacy Professionals (IAPP) indicate that "meeting regulatory compliance requirements continues to be the top perceived driver…
Descriptors: Privacy, Information Policy, Information Security, Higher Education
Basken, Paul – Chronicle of Higher Education, 2012
For some colleges and professors, classified research promises prestige and money. Powerhouses like the Massachusetts Institute of Technology and the Johns Hopkins University have for decades run large classified laboratories. But most other universities either do not allow such research or conduct it quietly, and in small doses. The…
Descriptors: Higher Education, Research, Access to Information, Barriers
Hart, Kevin – CURRENTS, 2010
According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…
Descriptors: Higher Education, Computer Security, Barriers, Confidentiality
Guernsey, Lisa – Chronicle of Higher Education, 2008
Colleges capture a slew of highly sensitive information on everyone on campus. While chief privacy officer has become a recognized title in the corporate world, higher education seems slow to pick up on the trend--a reluctance that could represent either head-in-the-sand thinking or fiscally prudent avoidance of bureaucratic bloat. This article…
Descriptors: Higher Education, Information Management, Information Policy, Confidential Records
Villano, Matt – Campus Technology, 2006
October is national Cyber Security Awareness Month, and for the world of higher education, that means it is time to take a look at defense systems and plan for the future. Clearly, more planning is needed now than ever before. According to the majority of IT market research firms, phishing and identity theft have leapfrogged spam and spyware as…
Descriptors: Higher Education, Campuses, Computer Security, Human Factors Engineering
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality
Nixon, Andrea – EDUCAUSE Quarterly, 2006
For years computer viruses have threatened productive use of personal computers, challenging users and support providers to prevent and recover from viral attacks. Now another type of computing malady has begun to enter popular consciousness: spyware. Typically, analyses of spyware focus on technical issues or provide pointers to resources for…
Descriptors: Laws, Compliance (Legal), Computer Security, Computers