NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Peer reviewed Peer reviewed
Cole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives
Petro, Jim – 1999
Survey data obtained in recent audits updated Ohio's local government units' assessment of Year 2000 (Y2K) readiness. The survey was developed with three intended objectives: (1) to provide an accurate assessment of the efforts to remediate the Y2K problem in Ohio's school districts, cities and counties; (2) to identify issues that could affect…
Descriptors: City Government, Computer Security, Counties, Elementary Secondary Education