Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Networks | 24 |
Higher Education | 24 |
Privacy | 24 |
Information Technology | 12 |
Computer Security | 11 |
Internet | 11 |
Access to Information | 8 |
Telecommunications | 7 |
Computers | 6 |
Information Networks | 6 |
Policy Formation | 6 |
More ▼ |
Source
Author
Panettieri, Joseph C. | 2 |
Anderson, John A. | 1 |
Baldwin, George D. | 1 |
Bristow, Rob | 1 |
Daugherty, Michael K. | 1 |
Di, Jia | 1 |
Dodds, Ted | 1 |
Gale, Doug | 1 |
Graveman, Richard F. | 1 |
Hawke, Constance S. | 1 |
Hodges, Marjorie W. | 1 |
More ▼ |
Publication Type
Education Level
Higher Education | 8 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Practitioners | 3 |
Administrators | 2 |
Students | 1 |
Location
Ohio | 3 |
Australia | 2 |
Netherlands | 2 |
United Kingdom | 2 |
Alaska | 1 |
Arkansas | 1 |
Asia | 1 |
Brazil | 1 |
Canada | 1 |
Connecticut | 1 |
Denmark | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Thompson, Dale R.; Di, Jia; Daugherty, Michael K. – IEEE Transactions on Education, 2014
The future cyber security workforce needs radio frequency identification (RFID) information systems security (INFOSEC) and threat modeling educational materials. A complete RFID security course with new learning materials and teaching strategies is presented here. A new RFID Reference Model is used in the course to organize discussion of RFID,…
Descriptors: Radio, Information Technology, Identification, Telecommunications
Bristow, Rob; Dodds, Ted; Northam, Richard; Plugge, Leo – EDUCAUSE Review, 2010
Some of the most significant changes in information technology are those that have given the individual user greater power to choose. The first of these changes was the development of the personal computer. The PC liberated the individual user from the limitations of the mainframe and minicomputers and from the rules and regulations of centralized…
Descriptors: Foreign Countries, Information Technology, Technological Advancement, Selection
Rosenblatt, Joel – EDUCAUSE Quarterly, 2008
Computer security is one of the most complicated and challenging fields in technology today. A security metrics program provides a major benefit: looking at the metrics on a regular basis offers early clues to changes in attack patterns or environmental factors that may require changes in security strategy. The term "security metrics"…
Descriptors: Copyrights, Privacy, Compliance (Legal), Computer Security
Gale, Doug – Campus Technology, 2007
The late 1980s was an exciting time to be a CIO in higher education. Computing was being decentralized as microcomputers replaced mainframes, networking was emerging, and the National Science Foundation Network (NSFNET) was introducing the concept of an "internet" to hundreds of thousands of new users. Security wasn't much of an issue;…
Descriptors: Higher Education, Computer Security, Computers, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security

Katz, James E.; Graveman, Richard F. – Telematics and Informatics, 1991
Discussion of the right to privacy of communications focuses on privacy expectations within a National Research and Education Network (NREN). Highlights include privacy needs in scientific and education communications; academic and research networks; network security and privacy concerns; protection strategies; and consequences of privacy…
Descriptors: Access to Information, Computer Networks, Higher Education, Privacy

Smith, Stephen A. – Communication Education, 1994
Examines First Amendment, privacy, and intellectual property issues of communication on the Internet. Discusses developments in communications policy related to the proposed communication superhighway. Suggests ways in which communication scholars can secure fundamental legal protections necessary for full, free, and effective communication in the…
Descriptors: Computer Networks, Freedom of Speech, Higher Education, Information Networks
Littman, Marlyn Kemper – Journal of Instruction Delivery Systems, 1996
Explores security challenges and practical approaches to safeguarding school networks against invasion. Highlights include security problems; computer viruses; privacy assaults; Internet invasions; building a security policy; authentication; passwords; encryption; firewalls; and acceptable use policies. (Author/LRW)
Descriptors: Computer Networks, Computer Security, Computer Uses in Education, Elementary Secondary Education
Wilson, David L. – Chronicle of Higher Education, 1993
Campus computing officials are working to improve security against computer hackers because of concerns about privacy, accidental or intentional damage to systems, and impediments to legitimate system users. Increasingly, public law enforcement authorities are called in but do not always take the problem seriously. (MSE)
Descriptors: Cheating, Computer Networks, Crime, Federal Legislation
Hodges, Marjorie W.; Worona, Steven L. – CAUSE/EFFECT, 1996
Provides guidelines for the development of campus computer policies, focusing on legal issues related to adult material, harassment, privacy, commerce, and copyright. Notes that computer use policies and practices need to evolve in concert with the changing computer culture. (MDM)
Descriptors: Business, College Role, Computer Networks, Computers

Wiggins, Rich – Public-Access Computer Systems Review, 1993
Describes the Gopher system developed at the University of Minnesota for accessing information on the Internet. Highlights include the need for navigation tools; Gopher clients; FTP (File Transfer Protocol); campuswide information systems; navigational enhancements; privacy and security issues; electronic publishing; multimedia; and future…
Descriptors: Access to Information, Computer Networks, Computer Software, Electronic Publishing
Hawke, Constance S. – 2001
The purpose of this book is threefold: (1) to inform Internet users of the legal ramifications of their on-line activities; (2) to help administrators handle specific situations or complaints regarding Internet activity; and (3) to provide guidance for the formulation of acceptable computer use policies on campuses. The chapters are: chapter 1,…
Descriptors: Computer Mediated Communication, Computer Networks, Computer Security, Copyrights
Weingarten, Fred W. – EDUCOM Review, 1994
Discusses issues relating to the public interest regarding the National Information Infrastructure. Topics addressed include access, including access to the physical infrastructure and resources and access as a service provider; information rights, including privacy, intellectual property, freedom of speech, and government information; public…
Descriptors: Access to Computers, Access to Information, Competition, Computer Networks
Previous Page | Next Page ยป
Pages: 1 | 2