Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 3 |
Educational Policy | 3 |
Information Systems | 3 |
Information Technology | 3 |
Guidelines | 2 |
Privacy | 2 |
Access to Information | 1 |
Administrative Policy | 1 |
Administrator Responsibility | 1 |
College Administration | 1 |
College Environment | 1 |
More ▼ |
Publication Type
Journal Articles | 3 |
Reports - Descriptive | 3 |
Education Level
Higher Education | 3 |
Postsecondary Education | 2 |
Audience
Location
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
von Munkwitz-Smith, Jeff; West, Ann – College and University, 2004
Navigating the multiple processes for accessing ever-multiplying campus information systems can be a daunting task for students, faculty, and staff. This article provides a brief overview of Identity and Access Management Services. The authors review key characteristics and components of this new information architecture and address the issue of…
Descriptors: Access to Information, Identification, Information Technology, Educational Policy
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy