Descriptor
Source
CAUSE/EFFECT | 11 |
Author
Actis, Bev | 1 |
Bernbom, Gerald | 1 |
Conrad, L. Dean | 1 |
Conway, James E. | 1 |
Hassler, Ardoth A. | 1 |
Lynch, Clifford | 1 |
Lynch, Clifford A. | 1 |
Riggen, Gary | 1 |
Russell, James S. | 1 |
Publication Type
Journal Articles | 11 |
Reports - Descriptive | 8 |
Opinion Papers | 3 |
Guides - Non-Classroom | 2 |
Education Level
Audience
Administrators | 7 |
Practitioners | 7 |
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Riggen, Gary – CAUSE/EFFECT, 1989
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
Descriptors: Access to Information, Computer Networks, Higher Education, Information Networks
Russell, James S. – CAUSE/EFFECT, 1994
Constrained by limited funds but concerned about lack of access to the Internet, Mount Hood Community College (Oregon) opened an account for the business and computer technology division with a commercial provider. Lessons learned about usage hours, limitations, access, modem speed, telephone line usage, and training are detailed. (MSE)
Descriptors: Access to Information, College Administration, College Faculty, Computer Networks
Lynch, Clifford A. – CAUSE/EFFECT, 1990
This article examines the technical access barriers that inhibit the effective use of the information resources available on higher education networks; the emerging information server technology that promises to alleviate many access problems; and the growing popularity of the Z39.50 protocol, including questions about this information retrieval…
Descriptors: Academic Libraries, Access to Information, Computer Networks, Computer Software
Conrad, L. Dean – CAUSE/EFFECT, 1992
This article describes Arizona State University's solution to security risk inherent in general access systems such as TCP/IP (Transmission Control Protocol/INTERNET Protocol). Advantages and disadvantages of various options are compared, and the process of selecting a log-on authentication approach involving generation of a different password at…
Descriptors: Access to Information, College Administration, Computer Networks, Decision Making
Bernbom, Gerald; And Others – CAUSE/EFFECT, 1994
Faced with the challenge of providing security across a complex, multiprotocol institutional information network, computing services at Indiana University implemented a responsive, collaborative security architecture designed for the future. Information systems design, security principles and strategy, and implementation are described. (Author/MSE)
Descriptors: Access to Information, College Administration, Computer Networks, Computer Oriented Programs
Conway, James E. – CAUSE/EFFECT, 1995
The Harvard University (Massachusetts) central computing and development offices collaborated to develop a prototype client/server fund-raising system that allows personnel to easily and quickly access and share prospect information. Its successful development is attributed to use of some traditional project management principles and practices.…
Descriptors: Access to Information, College Administration, Computer Networks, Donors
CAUSE/EFFECT, 1999
Discusses some emerging issues for information resources and use in higher education, including challenges in advanced networking; distributed-information technology (IT); authentication, authorization, and access management; distance learning; intellectual property in a networked environment; and campus-business continuity planning. Funding,…
Descriptors: Access to Information, College Administration, College Planning, Computer Networks
Lynch, Clifford – CAUSE/EFFECT, 1998
Describes access management problems associated with networked information systems and the two major architectural approaches used to address them, including discussion of related policy issues such as privacy, accountability, and collection of management data. Focus is on the concerns of colleges and universities and on developing practical…
Descriptors: Access to Information, Accountability, Administrative Policy, College Administration
Actis, Bev – CAUSE/EFFECT, 1995
The process that Kenyon College (Ohio) used in researching development of a campus-wide information system (CWIS) is outlined, and the most important issues to be considered in launching a successful CWIS are identified, including resources, needs, ownership, access, personnel, content, policy, design, staffing, marketing, and ongoing development.…
Descriptors: Access to Information, College Administration, Computer Networks, Higher Education
Hassler, Ardoth A. – CAUSE/EFFECT, 1998
Reports on a options and issues discussion at a December 1997 Orlando (Florida) meeting of CAUSE97 on providing access to campus technology resources. Options discussed included departmentally and/or university-owned modems, third-party provider contracts, and using wireless access. Issues included providing authentication, assuring network…
Descriptors: Access to Information, Communications, Computer Networks, Decision Making
CAUSE/EFFECT, 1998
Current and developing issues and trends in college and university information resources management are outlined, including retention/retraining/recruitment of information technology staff; policy and technical issues; growing complexity and cost of enterprise systems; student expectations for technology support and services; distributed learning…
Descriptors: Access to Information, Administrative Policy, College Administration, Computer Networks