Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 2 |
Descriptor
| Computer Networks | 2 |
| Computer Security | 2 |
| Computers | 2 |
| Handheld Devices | 2 |
| Higher Education | 2 |
| Information Technology | 2 |
| Internet | 2 |
| Privacy | 2 |
| Telecommunications | 2 |
| Administrators | 1 |
| College Students | 1 |
| More ▼ | |
Source
| Campus Technology | 2 |
Author
| Panettieri, Joseph C. | 2 |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Higher Education | 2 |
Audience
Location
| Indiana | 1 |
| Massachusetts | 1 |
| Ohio | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Panettieri, Joseph C. – Campus Technology, 2007
Without proper security, mobile devices are easy targets for worms, viruses, and so-called robot ("bot") networks. Hackers increasingly use bot networks to launch massive attacks against eCommerce websites--potentially targeting one's online tuition payment or fundraising/financial development systems. How can one defend his mobile systems against…
Descriptors: Internet, Web Sites, Handheld Devices, Information Technology
Panettieri, Joseph C. – Campus Technology, 2007
University CIOs and their municipal counterparts will need to ensure that broadband systems provide plenty of bandwidth for hundreds of different devices used by thousands--and perhaps even millions--of users. Some university WiFi networks are already clogged with too many users. Moreover, universities must somehow provide wireless network access…
Descriptors: Privacy, Telecommunications, Computer Networks, Computer Security

Direct link
