Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 1 |
| Since 2017 (last 10 years) | 2 |
| Since 2007 (last 20 years) | 4 |
Descriptor
| Academic Freedom | 8 |
| Computer Security | 8 |
| Higher Education | 4 |
| Privacy | 3 |
| Compliance (Legal) | 2 |
| Computer Networks | 2 |
| Crime Prevention | 2 |
| Government School Relationship | 2 |
| Performance Technology | 2 |
| Strategic Planning | 2 |
| Troubleshooting | 2 |
| More ▼ | |
Source
| Campus Technology | 2 |
| Chronicle of Higher Education | 2 |
| Academe: Bulletin of the AAUP | 1 |
| EDUCAUSE Quarterly | 1 |
| ProQuest LLC | 1 |
| US Department of Education | 1 |
Author
| Archibald, Fred | 1 |
| Carlson, Scott | 1 |
| Christopher D. Adams | 1 |
| Davida, George I. | 1 |
| Foster, Andrea L. | 1 |
| Ramaswami, Rama | 1 |
| Silverstone, Ariel | 1 |
Publication Type
| Journal Articles | 6 |
| Reports - Descriptive | 5 |
| Collected Works - Serial | 1 |
| Dissertations/Theses -… | 1 |
| Numerical/Quantitative Data | 1 |
| Opinion Papers | 1 |
Education Level
| Higher Education | 4 |
| Postsecondary Education | 2 |
| Elementary Secondary Education | 1 |
Audience
| Administrators | 1 |
| Teachers | 1 |
Location
| Italy | 1 |
| Pennsylvania | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Christopher D. Adams – ProQuest LLC, 2023
Modern higher education institutions must contend with a litany of cyber threats, regulations, and environmental dynamics. These institutions are increasingly being targeted due to the value of the data they possess and their historically permissive configurations that are intended to support academic freedom. Many universities are implementing…
Descriptors: Information Security, Computer Security, Academic Freedom, Corporate Education
US Department of Education, 2021
As a precursor to this annual report, in February 2018, the Department issued its "U.S. Department of Education Strategic Plan for Fiscal Years [FY] 2018-22" ("Strategic Plan") (see ED586968). The "Strategic Plan" establishes four broad, overarching goals--one goal each in the areas of K-12 education, postsecondary…
Descriptors: Public Agencies, Federal Government, Strategic Planning, Educational Planning
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Ramaswami, Rama – Campus Technology, 2008
When it comes to dealing with cyber attacks, there's no silver bullet. Ironically, however, college educators are already accustomed to wielding what may be the best weapon of all--education. Assaulted by the myriad species of spam, worms, Trojan horses, spyware, viruses, and other diseases that so easily infect and sometimes devastate campus…
Descriptors: Information Systems, Educational Environment, Computer Security, Crime Prevention
Silverstone, Ariel – EDUCAUSE Quarterly, 2004
In academic settings, battling Internet threats and coming out unscathed is uncommon. Unfortunately, on many college campuses cyber-security concerns rarely extend beyond the IT staff and are addressed in a disparate, ad-hoc fashion. Yet, while many universities and large corporations were hit hard by the recent NetSky and Sasser worms, fewer than…
Descriptors: Campuses, Academic Freedom, Computer Security, Educational Technology
Carlson, Scott; Foster, Andrea L. – Chronicle of Higher Education, 2002
Describes how many college officials are confused by the USA Patriot Act, a new anti-terrorism law that may affect campus networks and library records; they believe its provisions could raise privacy and academic freedom issues. (EV)
Descriptors: Academic Freedom, Compliance (Legal), Computer Security, Confidential Records
Peer reviewedDavida, George I. – Academe: Bulletin of the AAUP, 1981
The Public Cryptography Study Group accepted the claim made by the National Security Agency that some information in some publications concerning cryptology could be inimical to national security, and is allowing the establishment of a voluntary mechanism, on an experimental basis, for NSA to review cryptology manuscripts. (MLW)
Descriptors: Academic Freedom, Computer Security, Computers, Cryptography
Chronicle of Higher Education, 2004
"Chronicle of Higher Education" presents an abundant source of news and information for college and university faculty members and administrators. This January 16, 2004 issue of "Chronicle for Higher Education" contains the following articles: (1) "Gymnasium, Ecology Lab, Sentinel" (Selingo, Jeffrey); (2) "Fewer…
Descriptors: Ecology, Higher Education, Foreign Countries, College Faculty

Direct link
