Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 4 |
Descriptor
Computer Networks | 7 |
Computer Security | 7 |
Crime Prevention | 7 |
Information Technology | 7 |
Internet | 2 |
Risk Management | 2 |
Academic Freedom | 1 |
Access to Information | 1 |
Certification | 1 |
Check Lists | 1 |
Codes of Ethics | 1 |
More ▼ |
Source
ProQuest LLC | 2 |
Campus Technology | 1 |
Community College Journal | 1 |
Journal of Information… | 1 |
Technology & Learning | 1 |
Author
Anderson, John A. | 1 |
Blakely, Benjamin A. | 1 |
Council, Chip | 1 |
Dark, Melissa | 1 |
Li, Chengcheng | 1 |
Poftak, Amy | 1 |
Ramaswami, Rama | 1 |
Sibai, Faisal M. | 1 |
Publication Type
Journal Articles | 4 |
Reports - Descriptive | 4 |
Dissertations/Theses -… | 2 |
Reports - Evaluative | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Two Year Colleges | 1 |
Audience
Administrators | 1 |
Location
Ohio | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Blakely, Benjamin A. – ProQuest LLC, 2012
The problem of attributing cyber attacks is one of increasing importance. Without a solid method of demonstrating the origin of a cyber attack, any attempts to deter would-be cyber attackers are wasted. Existing methods of attribution make unfounded assumptions about the environment in which they will operate: omniscience (the ability to gather,…
Descriptors: Computer Security, Information Technology, Crime, Crime Prevention
Li, Chengcheng – Journal of Information Technology Education: Innovations in Practice, 2015
As both the frequency and the severity of network breaches have increased in recent years, it is essential that cybersecurity is incorporated into the core of business operations. Evidence from the U.S. Bureau of Labor Statistics (Bureau of Labor Statistics, 2012) indicates that there is, and will continue to be, a severe shortage of cybersecurity…
Descriptors: Curriculum Development, Computer Security, Internet, Computer Networks
Sibai, Faisal M. – ProQuest LLC, 2012
There has been a constant growing security concern with insider attacks on network accessible computer systems. Users with power credentials can do almost anything they want with the systems they own with very little control or oversight. Most breaches occurring nowadays by power users are considered legitimate access and not necessarily…
Descriptors: Computer Security, Power Structure, Information Technology, Computer Networks
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Dark, Melissa; Poftak, Amy – Technology & Learning, 2004
In this article, the authors address the importance of taking a proactive approach to securing a school's network. To do this, it is first required to know the system's specific vulnerabilities and what steps to take to reduce them. The formal process for doing this is known as an information security risk assessment, or a security audit. What…
Descriptors: Computer Security, School Districts, Risk Management, Computer Networks
Anderson, John A. – 1996
Information Technology (IT) personnel in higher education requirement at Mary Washington College, Virginia. The goal of the creativity, promote freedom of speech, support research and investigation, and provide information access globally, while demonstrating proper use and protection of the data of which they are in charge. This paper addresses…
Descriptors: Codes of Ethics, Computer Networks, Computer Security, Confidentiality