NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 4 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Davidson, Mary Ann – EDUCAUSE Review, 2005
Leadership in IT security is needed. Security matters: the ethics, the economics, and the social implications. There is much the academic community can do to help ensure cybersecurity. This document discusses steps academia can take to help ensure cybersecurity.
Descriptors: Internet, Computer Security, Ethics, Social Issues
Peer reviewed Peer reviewed
Direct linkDirect link
Voss, Brian D.; Siegel, Peter M. – EDUCAUSE Review, 2009
Considering the unprecedented budget hardships in higher education, now may not seem to be an auspicious time to be emphasizing the importance of continuing, or even perhaps increasing, investments in information security. Decisions regarding these matters are usually in the hands of the CIOs, leaving information technology (IT) leaders in…
Descriptors: Higher Education, Economic Climate, Information Systems, Information Technology
Peer reviewed Peer reviewed
Direct linkDirect link
Gonick, Lev S. – EDUCAUSE Review, 2006
In the first decades of the IT revolution, disproportionate amounts of intellectual energy and financial investment were expended in building out the technology foundations. As a result, campuses now rely heavily on technology and Web resources that, though radically altering the academic landscape, have remained centered on the build-out of core…
Descriptors: Information Technology, Higher Education, Educational Innovation, Educational Change
Peer reviewed Peer reviewed
Direct linkDirect link
Luker, Mark A. – EDUCAUSE Review, 2004
The Homepage column in the March/April 2003 issue of "EDUCAUSE Review" explained the national implication of security vulnerabilities in higher education and the role of the EDUCAUSE/Internet2 Computer and Network Security Task Force in representing the higher education sector in the development of the National Strategy to Secure Cyberspace. Among…
Descriptors: Law Enforcement, Higher Education, National Security, Computer Security