Descriptor
| Computer Networks | 1 |
| Computer Security | 1 |
| Computer System Design | 1 |
| Design Requirements | 1 |
| Educational Technology | 1 |
| Guidelines | 1 |
| Higher Education | 1 |
| Information Technology | 1 |
| Problem Solving | 1 |
| Trend Analysis | 1 |
Source
| EDUCAUSE Review | 1 |
Author
| Voloudakis, John | 1 |
Publication Type
| Information Analyses | 1 |
| Journal Articles | 1 |
| Reports - Descriptive | 1 |
Education Level
| Higher Education | 1 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Voloudakis, John – EDUCAUSE Review, 2006
In the past three years, higher education institutions have made a number of moves to secure their critical systems and protect their users, resulting in a marked change in the techniques used to combat security threats. Today, continued progress may depend on the development of an enterprise IT security program. (Contains 10 notes.)
Descriptors: Educational Technology, Information Technology, Higher Education, Computer Security

Peer reviewed
Direct link
