NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)5
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 10 results Save | Export
Business-Higher Education Forum, 2014
The Business-Higher Education Forum (BHEF) has achieved particular success in operationalizing the National Higher Education and Workforce Initiative (HEWI) in Maryland around cybersecurity. Leveraging its membership of corporate CEOs, university presidents, and government agency leaders, BHEF partnered with the University System of Maryland to…
Descriptors: Internet, Computer Security, Corporations, College Presidents
Ross, Virginia Watson – ProQuest LLC, 2010
Cloud computing is a growing field, addressing the market need for access to computing resources to meet organizational computing requirements. The purpose of this research is to evaluate the factors that influence an organization in their decision whether to adopt cloud computing as a part of their strategic information technology planning.…
Descriptors: Technology Planning, Information Technology, Internet, Strategic Planning
Grush, Mary – Campus Technology, 2007
Ken Klingenstein has led national networking initiatives for the past 25 years. He served as director of computing and network services at the University of Colorado at Boulder from 1985-1999, and today, Klingenstein is director of middleware and security for Internet2. Truth is, this networking innovator has participated in the development of the…
Descriptors: Higher Education, Internet, Information Technology, Computer Interfaces
Peer reviewed Peer reviewed
Direct linkDirect link
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Quarterly, 2007
The Eighth Annual EDUCAUSE Current Issues Survey asked campus information technology leaders to rate the most critical IT challenges facing them, their campuses, and/or their systems. Four findings associated with all respondents to this year's survey merit special mention. First, for the 2007 survey, the CIC decided to split a key issue choice…
Descriptors: Information Systems, Information Technology, Computer Uses in Education, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Benson, Allen C. – 1998
This handbook is designed to help readers identify and eliminate security risks, with sound recommendations and library-tested security software. Chapter 1 "Managing Your Facilities and Assessing Your Risks" addresses fundamental management responsibilities including planning for a secure system, organizing computer-related information, assessing…
Descriptors: Computer Security, Computer Software, Computer System Design, Information Systems
Peer reviewed Peer reviewed
Direct linkDirect link
Spicer, Donald Z.; Deblois, Peter B. – EDUCAUSE Review, 2004
This article features the EDUCAUSE Current Issues Survey. Administered by the EDUCAUSE Current Issues Committee, whose members review and recommend the set of issues to be presented each year, the survey identifies the issues that leaders in higher education information technology see as their most critical IT challenges. The Top-Ten current IT…
Descriptors: Information Technology, Higher Education, Surveys, Financial Support
Peer reviewed Peer reviewed
Direct linkDirect link
Maltz, Leslie; DeBlois, Peter D. – EDUCAUSE Review, 2005
Administered by the EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, the sixth annual EDUCAUSE Current Issues Survey was conducted in December of 2004. Survey participants--the primary representatives, typically CIOs, of EDUCAUSE member institutions--were asked to check up to…
Descriptors: Information Technology, Higher Education, Surveys, Financial Support
Szuba, Tom – 1998
This guide was developed specifically for educational administrators at the building, campus, district, system, and state levels, and is meant to serve as a framework to help them better understand why and how to effectively secure their organization's information, software, and computer and networking equipment. This document is organized into 10…
Descriptors: Access to Information, Computer Networks, Computer Security, Computer Software
International Association for Development of the Information Society, 2012
The IADIS CELDA 2012 Conference intention was to address the main issues concerned with evolving learning processes and supporting pedagogies and applications in the digital age. There had been advances in both cognitive psychology and computing that have affected the educational arena. The convergence of these two disciplines is increasing at a…
Descriptors: Academic Achievement, Academic Persistence, Academic Support Services, Access to Computers