Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 7 |
Descriptor
College Administration | 8 |
Computer Security | 8 |
Internet | 8 |
Information Technology | 7 |
Technology Planning | 5 |
Access to Information | 4 |
Foreign Countries | 4 |
Information Storage | 4 |
Risk | 4 |
Computer Software | 3 |
Handheld Devices | 3 |
More ▼ |
Source
EDUCAUSE Quarterly | 5 |
Campus Technology | 1 |
Chronicle of Higher Education | 1 |
International Association for… | 1 |
Author
Bennett, Cedric | 1 |
Gray, Terry | 1 |
Isias, Pedro, Ed. | 1 |
Issa, Theodora, Ed. | 1 |
Issa, Tomayess, Ed. | 1 |
Kommers, Piet, Ed. | 1 |
McKay, Elspeth, Ed. | 1 |
Oxley, Alan | 1 |
Sheard, Reed | 1 |
Trappler, Thomas J. | 1 |
Villano, Matt | 1 |
More ▼ |
Publication Type
Journal Articles | 7 |
Reports - Descriptive | 7 |
Collected Works - Proceedings | 1 |
Education Level
Higher Education | 8 |
Postsecondary Education | 7 |
Audience
Location
California | 3 |
Australia | 1 |
China | 1 |
Costa Rica | 1 |
Croatia | 1 |
India | 1 |
Minnesota | 1 |
Poland | 1 |
Russia | 1 |
Saudi Arabia | 1 |
South Africa | 1 |
More ▼ |
Laws, Policies, & Programs
Family Educational Rights and… | 1 |
Assessments and Surveys
Rosenberg Self Esteem Scale | 1 |
What Works Clearinghouse Rating
Trappler, Thomas J. – EDUCAUSE Quarterly, 2010
Much recent discussion has focused on the pros and cons of cloud computing. Some institutions are attracted to cloud computing benefits such as rapid deployment, flexible scalability, and low initial start-up cost, while others are concerned about cloud computing risks such as those related to data location, level of service, and security…
Descriptors: Foreign Countries, Risk, Vendors, Best Practices
Sheard, Reed – EDUCAUSE Quarterly, 2010
When the author was brought on as CIO of Westmont College in October 2008, the president, Board of Trustees, and campus environment made it clear that technology needed a major overhaul to meet the college's growing requirements. Also, these changes needed to happen without significantly increasing the IT budget or staff. Marketing Charts…
Descriptors: Problem Solving, Computer Mediated Communication, Educational Finance, Innovation
Gray, Terry – EDUCAUSE Quarterly, 2010
The University of Washington (UW) adopted a dual-provider cloud-computing strategy, focusing initially on software as a service. The original project--to replace an obsolete alumni e-mail system--resulted in a cloud solution that soon grew to encompass the entire campus community. The policies and contract terms UW developed, focusing on…
Descriptors: Barriers, Program Development, Program Implementation, Computer Software
Villano, Matt – Campus Technology, 2007
Nowadays, college and university auxiliary services departments are turning to text messaging types of technologies to move a host of programs and offerings into the mobile environment. A July 2007 study by Youth Trends indicated that 95 percent of college freshmen come to school with a cell phone or other handheld device, and 78 percent of them…
Descriptors: Higher Education, College Students, Communication Strategies, College Administration
Woo, Stu – Chronicle of Higher Education, 2006
San Jose State University is planning to ban Skype, a popular Internet telephone service, from the campus network because of concerns about security and bandwidth. University administrators say that the technical aspects that make Skype effective also make it dangerous and potentially crippling to a university's network bandwidth. Skype has a…
Descriptors: Foreign Countries, Computer Networks, Computer Security, College Faculty
Bennett, Cedric – EDUCAUSE Quarterly, 2006
Many of the information security appliances, devices, and techniques currently in use are designed to keep unwanted users and Internet traffic away from important information assets by denying unauthorized access to servers, databases, networks, storage media, and other underlying technology resources. These approaches employ firewalls, intrusion…
Descriptors: Computer Security, Information Technology, Computer Software, College Administration
Oxley, Alan – EDUCAUSE Quarterly, 2005
It is difficult to estimate the costs of not writing thorough IT policy. Misuse of IT resources, whether through ignorance or malice, costs money, as do court cases that can result from abuse. Furthermore, a poor university accreditation report caused in part by poor policy documents will likely have an adverse impact on student enrollment. There…
Descriptors: Ethics, Privacy, Foreign Countries, Information Technology
Kommers, Piet, Ed.; Issa, Tomayess, Ed.; Issa, Theodora, Ed.; McKay, Elspeth, Ed.; Isias, Pedro, Ed. – International Association for Development of the Information Society, 2016
These proceedings contain the papers and posters of the International Conferences on Internet Technologies & Society (ITS 2016), Educational Technologies (ICEduTech 2016) and Sustainability, Technology and Education (STE 2016), which have been organised by the International Association for Development of the Information Society and…
Descriptors: Conferences (Gatherings), Foreign Countries, Internet, Educational Technology