Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 2 |
| Computer Software | 2 |
| Access to Computers | 1 |
| Campuses | 1 |
| College Administration | 1 |
| Colleges | 1 |
| Compliance (Legal) | 1 |
| Computer Networks | 1 |
| Confidentiality | 1 |
| Handheld Devices | 1 |
| Higher Education | 1 |
| More ▼ | |
Publication Type
| Journal Articles | 2 |
| Reports - Descriptive | 2 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
Location
| Kansas | 2 |
| Illinois | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Corn, Michael; Rosenthal, Jane – EDUCAUSE Review, 2013
Where does privacy belong in the college/university ecosystem, and what should its relationship be with security and compliance? Are the three areas best kept separate and distinct? Should there be some overlap? Or would a single office, officer, and/or reporting line enable a big picture of the whole? This article examines several of the campus…
Descriptors: Privacy, Compliance (Legal), Campuses, Strategic Planning
Sendze, Monique – Computers in Libraries, 2006
Securing public access workstations should be a significant part of any library's network and information-security strategy because of the sensitive information patrons enter on these workstations. As the IT manager for the Johnson County Library in Kansas City, Kan., this author is challenged to make sure that thousands of patrons get the access…
Descriptors: Workstations, Public Libraries, Library Services, Library Role

Peer reviewed
Direct link
