Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Security | 3 |
| Computer Uses in Education | 3 |
| Computer Networks | 2 |
| Computer Software | 2 |
| Electronic Mail | 2 |
| Ethics | 2 |
| Internet | 2 |
| Access to Information | 1 |
| Administrative Policy | 1 |
| Censorship | 1 |
| College Faculty | 1 |
| More ▼ | |
Source
| Chronicle of Higher Education | 3 |
Publication Type
| Journal Articles | 3 |
| Reports - Descriptive | 3 |
Education Level
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cesarini, Paul – Chronicle of Higher Education, 2007
This article describes The Onion Router (TOR). It is a freely available, open-source program developed by the U.S. Navy about a decade ago. A browser plug-in, it thwarts online traffic analysis and related forms of Internet surveillance by sending your data packets through different routers around the world. As each packet moves from one router to…
Descriptors: Internet, Computer Software, Computer Security, Confidentiality
Olson, Gary A. – Chronicle of Higher Education, 2007
Many professors, staff members, and even administrators see campus computers and e-mail accounts as their own private property--a type of employment benefit provided with no constraints on use. The fact is, universities "assign" computer equipment to personnel as tools to help them perform their jobs more effectively and efficiently, in the same…
Descriptors: Ethics, College Faculty, Computer Security, Electronic Mail
McCollum, Kelly – Chronicle of Higher Education, 1999
Colleges and universities are finding that ways to misbehave in computer-mediated communication come along faster than institutions can create policies to deal with them. Although most schools have acceptable-use policies, technological advances change the environment quickly and require flexible policies. Most institutions have created a mix of…
Descriptors: Administrative Policy, Computer Mediated Communication, Computer Networks, Computer Security

Direct link
