Descriptor
| Computer Security | 2 |
| Access to Information | 1 |
| Computer Networks | 1 |
| Computer System Design | 1 |
| Design Requirements | 1 |
| Educational Technology | 1 |
| Guidelines | 1 |
| Higher Education | 1 |
| Information Technology | 1 |
| Internet | 1 |
| Privacy | 1 |
| More ▼ | |
Source
| EDUCAUSE Review | 1 |
| Internet Research | 1 |
Author
| De Maeyer, Dirk | 1 |
| Voloudakis, John | 1 |
Publication Type
| Information Analyses | 2 |
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Peer reviewedDe Maeyer, Dirk – Internet Research, 1997
Examines the Internet's potential for becoming an information highway. Highlights include definitions of the information highway and the Internet; the infrastructure of an information highway; capacity; connectivity; simultaneity; network protocols; applications; interactivity; openness; mobility and remote access; universal access; affordable…
Descriptors: Access to Information, Computer Security, Internet, Privacy
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security

Direct link
