Publication Date
In 2025 | 1 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 15 |
Descriptor
Administrators | 16 |
Computer Security | 16 |
Information Technology | 16 |
Computer Networks | 7 |
Higher Education | 6 |
Telecommunications | 5 |
Computer Uses in Education | 3 |
Educational Technology | 3 |
Information Security | 3 |
Information Systems | 3 |
Internet | 3 |
More ▼ |
Source
ProQuest LLC | 6 |
Campus Technology | 2 |
Association Supporting… | 1 |
Chronicle of Higher Education | 1 |
EDUCAUSE | 1 |
EDUCAUSE Quarterly | 1 |
EDUCAUSE Review | 1 |
Educational Media… | 1 |
School Administrator | 1 |
Technology & Learning | 1 |
Author
Publication Type
Journal Articles | 8 |
Reports - Descriptive | 7 |
Dissertations/Theses -… | 6 |
Collected Works - Proceedings | 1 |
Numerical/Quantitative Data | 1 |
Opinion Papers | 1 |
Reports - Research | 1 |
Tests/Questionnaires | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 5 |
Elementary Secondary Education | 3 |
Two Year Colleges | 2 |
Audience
Administrators | 1 |
Location
Indiana | 3 |
Massachusetts | 2 |
New Jersey | 2 |
Ohio | 2 |
California | 1 |
Cyprus | 1 |
Florida | 1 |
Georgia | 1 |
Kentucky | 1 |
Maryland | 1 |
Michigan | 1 |
More ▼ |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Christiana Karousiou – Educational Media International, 2025
This research study explores the challenges and barriers in school digital transformation based on the perspectives and experiences of school leaders within the Republic of Cyprus. This study employs a qualitative research approach, using interviews to collect insights from 11 purposively selected primary and secondary school leaders. The…
Descriptors: Administrators, Elementary Secondary Education, Foreign Countries, Information Technology
Tanque, Marcus M. – ProQuest LLC, 2012
The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…
Descriptors: Information Technology, Administrators, Adoption (Ideas), Administrator Attitudes
Skallos, Maryly K. – ProQuest LLC, 2014
With funding cuts, reduced enrollments, and meeting a presidential initiative, Michigan community colleges need to find ways in which they can continue to provide quality education at an affordable price. Consumerization of information technology (IT) has been proposed to meet the technological needs of the community college. There is little…
Descriptors: Community Colleges, Qualitative Research, Information Technology, Administrators
Balogun, Shereef Adewale – ProQuest LLC, 2013
Information technology (IT) outsourcing is a practical way to transfer information technology by industries of different firms. The problem occurs when companies outsource services to domestic and international data centers as network security issues arise. This leads to competition between companies causing the size of the company to become more…
Descriptors: Outsourcing, Information Technology, Risk, Organization Size (Groups)
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology
Chithambo, Loyce Maosa – ProQuest LLC, 2011
Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…
Descriptors: Information Technology, Teleworking, Information Security, Computer Security
Bolch, Matt – Technology & Learning, 2009
Whether for an entire district, a single campus, or one classroom, allowing authorized access to a computer network can be fraught with challenges. The login process should be fairly seamless to approved users, giving them speedy access to approved Web sites, databases, and other sources of information. It also should be tough on unauthorized…
Descriptors: Computer Networks, Access to Computers, Information Management, Information Technology
Schaffhauser, Dian – Campus Technology, 2009
Will that data breach be the end of a chief security officer (CSO)? Managing information security in higher education requires more than just technical expertise, especially when the heat is cranked up. This article takes a look at how two CSOs deal with hack attacks at their universities. When Purdue University Chief Information Security Officer…
Descriptors: Higher Education, Computer Security, Information Technology, Information Networks
Smith, Peter, Ed. – Association Supporting Computer Users in Education, 2015
The Association Supporting Computer Users in Education (ASCUE) is a group of people interested in small college computing issues. It is a blend of people from all over the country who use computers in their teaching, academic support, and administrative support functions. ASCUE has a strong tradition of bringing its members together to pool their…
Descriptors: Workshops, Administrators, Educational Games, Access to Information
MacFarlane, Maureen A. – School Administrator, 2007
The widespread use of virtual classrooms, Internet exploration and chat rooms has stretched the concept of the schoolhouse while the popularity of social networking sites, blogging and text messaging have affected the way students communicate with and about each other, their teachers, school administrators, and their schools. Add to the mix…
Descriptors: Educational Strategies, Internet, Computer Security, Child Safety
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security
Dougherty, Jennifer Dowling; Clebsch, William; Anderson, Greg – EDUCAUSE Quarterly, 2004
Budget pressures compel everyone in higher education to demonstrate value in IT investments, using both quantitative and qualitative information. Like many institutions, however, both Stanford and Massachusetts Institute of Technology (MIT) have found themselves forced to rely more on anecdotes than on management information to guide decisions. In…
Descriptors: Higher Education, Benchmarking, Information Technology, Administration
Martin, James; Samels, James E. – Chronicle of Higher Education, 2007
College and university presidents are increasingly called upon to make informed choices about technology. The rapidly shifting landscape makes it tough to keep up with change and innovation, let alone stay ahead of the curve. In this article, the authors discuss 10 trends to watch in campus technology. These trends are the following: (1) increased…
Descriptors: Educational Trends, Information Technology, Partnerships in Education, Proprietary Schools
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Review, 2007
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2006 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Computer Software, Telecommunications, Computer Networks, Computer Uses in Education
Previous Page | Next Page ยป
Pages: 1 | 2