Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 3 |
Higher Education | 3 |
School Security | 3 |
Security Personnel | 3 |
Stealing | 2 |
Alarm Systems | 1 |
Best Practices | 1 |
College Administration | 1 |
Computer Networks | 1 |
Computers | 1 |
Crime Prevention | 1 |
More ▼ |
Publication Type
Journal Articles | 2 |
Reports - Descriptive | 2 |
Books | 1 |
Guides - Non-Classroom | 1 |
Legal/Legislative/Regulatory… | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Administrators | 1 |
Community | 1 |
Policymakers | 1 |
Practitioners | 1 |
Location
Laws, Policies, & Programs
Student Right to Know and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Harrison, J. Phil – Business Officer, 1996
A discussion of computer theft prevention on college campuses looks at a variety of elements in electronic equipment security, including the extent of the problem, physical antitheft products, computerized access, control of key access, alarm systems, competent security personnel, lighting, use of layers of protection, and increasing…
Descriptors: Alarm Systems, College Administration, Computer Security, Computers
Smith, Michael Clay; Fossey, Richard – 1995
This book discusses issues related to campus crime and offers administrators suggestions and checklists that can be used to evaluate current procedures and defuse potential problems. Chapters cover: (1) "The Campus: A Sanctuary?"; (2) "The Complexion of Campus Crime Today"; (3) "The Concept of Crime and the Shape of…
Descriptors: Computer Security, Crime Prevention, Due Process, Evidence (Legal)