Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 9 |
Descriptor
Computer Security | 12 |
Guidelines | 12 |
Information Technology | 12 |
Privacy | 5 |
Higher Education | 4 |
Information Systems | 4 |
Technology Planning | 4 |
College Administration | 3 |
Computer System Design | 3 |
Educational Policy | 3 |
Ethics | 3 |
More ▼ |
Source
EDUCAUSE Quarterly | 4 |
Campus Technology | 1 |
EDUCAUSE Review | 1 |
Journal of Information… | 1 |
Online Journal of Distance… | 1 |
Online Submission | 1 |
ProQuest LLC | 1 |
School Business Affairs | 1 |
Author
Anderson, Alicia | 1 |
Clapper, Danial L. | 1 |
Ford, Janet C. | 1 |
Gale, Doug | 1 |
Ilci, Ahmet | 1 |
Oxley, Alan | 1 |
Qayoumi, Mohammad H. | 1 |
Shaffer, Steven C. | 1 |
Smith, Gary | 1 |
Stover, Mark | 1 |
Trappler, Thomas J. | 1 |
More ▼ |
Publication Type
Journal Articles | 10 |
Reports - Descriptive | 9 |
Books | 1 |
Dissertations/Theses -… | 1 |
Guides - Non-Classroom | 1 |
Information Analyses | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 9 |
Postsecondary Education | 8 |
Elementary Secondary Education | 1 |
Audience
Administrators | 1 |
Media Staff | 1 |
Practitioners | 1 |
Laws, Policies, & Programs
Family Educational Rights and… | 2 |
Assessments and Surveys
What Works Clearinghouse Rating
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Willey, Lorrie; Ford, Janet C.; White, Barbara Jo; Clapper, Danial L. – Journal of Information Systems Education, 2011
The impact of intellectual property (IP) law on information systems (IS) professionals in business cannot be overstated. The IS 2010 model curriculum guidelines for undergraduate IS programs stress the importance of information security and knowledge about IP. While copyright and patents are the most well-known types of IP, another, trade secrets,…
Descriptors: Copyrights, Confidentiality, Computer Security, Information Systems
Shaffer, Steven C. – Online Journal of Distance Learning Administration, 2012
Assessment is an important part of distance education (DE). As class sizes get larger and workloads increase, the IT infrastructure and processes used for DE assessments become more of an issue. Using the BS ISO/IEC 23988:2007 Standard for the use of technology in the delivery of assessments as a guide, this paper describes a rational approach to…
Descriptors: Distance Education, Educational Technology, Disadvantaged, Quality Assurance
Smith, Gary – School Business Affairs, 2011
School business administrators have long recognized the need for a workable data recovery plan regardless of cause. Yet many have not reassessed their current data backup and recovery capabilities, perhaps because they have not experienced a catastrophic failure. There are three reasons school business administrators may not realize or recognize…
Descriptors: Information Technology, Computer Security, Technology Planning, School Business Officials
Wyne, Mudasser F. – Online Submission, 2010
It is hard to define a single set of ethics that will cover an entire computer users community. In this paper, the issue is addressed in reference to code of ethics implemented by various professionals, institutes and organizations. The paper presents a higher level model using hierarchical approach. The code developed using this approach could be…
Descriptors: Ethics, Models, Program Development, Computer Mediated Communication
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Gale, Doug – Campus Technology, 2007
The basics of authentication are straightforward. One can prove his or her identity in three ways: (1) something one "has" (for example, a key or a birth certificate); (2) something one "knows" (such as a password); or (3) something one "is" (such as one's fingerprints, used in biometric technologies). In the world of computers and networks, the…
Descriptors: Computer Security, Prevention, Guidelines, Higher Education
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Stover, Mark – 1999
This book explains through descriptive narrative, illustrative examples, and practical suggestions how today's information specialists can navigate in the new "wired" organizations. The emphasis is on practical, useful, relevant advice. The following ten chapters are included: (1) "Communicating Online: The Heart of the Wired Organization"…
Descriptors: Administration, Computer Security, Ethics, Guidelines
Qayoumi, Mohammad H.; Woody, Carol – EDUCAUSE Quarterly, 2005
Good information security does not just happen--and often does not happen at all. Resources are always in short supply, and there are always other needs that seem more pressing. Why? Because information security is hard to define, the required tasks are unclear, and the work never seems to be finished. However, the loss to the organization can be…
Descriptors: Confidentiality, Computer Security, Risk, Privacy