Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 1 |
Descriptor
Computer Security | 4 |
Information Sources | 4 |
Information Technology | 4 |
Problems | 2 |
Access to Information | 1 |
City Government | 1 |
Computer Networks | 1 |
Computer Software | 1 |
Computer System Design | 1 |
Constitutional Law | 1 |
Copyrights | 1 |
More ▼ |
Author
Cole, Timothy W. | 1 |
Keating, Joseph, Comp. | 1 |
Peslak, Alan R. | 1 |
Petro, Jim | 1 |
Ponder, Tim, Comp. | 1 |
Ropog, Marty, Comp. | 1 |
Publication Type
Reports - Descriptive | 4 |
Journal Articles | 2 |
Education Level
Higher Education | 1 |
Postsecondary Education | 1 |
Audience
Media Staff | 1 |
Practitioners | 1 |
Location
Ohio | 1 |
Pennsylvania | 1 |
Laws, Policies, & Programs
Digital Millennium Copyright… | 1 |
First Amendment | 1 |
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing

Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives
Petro, Jim – 1999
Survey data obtained in recent audits updated Ohio's local government units' assessment of Year 2000 (Y2K) readiness. The survey was developed with three intended objectives: (1) to provide an accurate assessment of the efforts to remediate the Y2K problem in Ohio's school districts, cities and counties; (2) to identify issues that could affect…
Descriptors: City Government, Computer Security, Counties, Elementary Secondary Education