Publication Date
| In 2026 | 0 |
| Since 2025 | 0 |
| Since 2022 (last 5 years) | 0 |
| Since 2017 (last 10 years) | 0 |
| Since 2007 (last 20 years) | 1 |
Descriptor
| Computer Security | 4 |
| Information Sources | 4 |
| Information Technology | 4 |
| Problems | 2 |
| Access to Information | 1 |
| City Government | 1 |
| Computer Networks | 1 |
| Computer Software | 1 |
| Computer System Design | 1 |
| Constitutional Law | 1 |
| Copyrights | 1 |
| More ▼ | |
Author
| Cole, Timothy W. | 1 |
| Keating, Joseph, Comp. | 1 |
| Peslak, Alan R. | 1 |
| Petro, Jim | 1 |
| Ponder, Tim, Comp. | 1 |
| Ropog, Marty, Comp. | 1 |
Publication Type
| Reports - Descriptive | 4 |
| Journal Articles | 2 |
Education Level
| Higher Education | 1 |
| Postsecondary Education | 1 |
Audience
| Media Staff | 1 |
| Practitioners | 1 |
Location
| Ohio | 1 |
| Pennsylvania | 1 |
Laws, Policies, & Programs
| Digital Millennium Copyright… | 1 |
| First Amendment | 1 |
| Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Peslak, Alan R. – Information Systems Education Journal, 2010
One of the most important topics for today's information technology professional is the study of legal and regulatory issues as they relate to privacy and security of personal and business data and identification. This manuscript describes the topics and approach taken by the instructors that focuses on independent research of source documents and…
Descriptors: Privacy, Information Security, Computer Security, Electronic Publishing
Peer reviewedCole, Timothy W. – Library Hi Tech, 1997
Describes the security issues Bluestem, a Web authentication and access control system under development at the University of Illinois at Urbana-Champaign, is designed to resolve. Provides an overview of how Bluestem works and details how Bluestem is currently being used to control end-user access to bibliographic resources licensed by the…
Descriptors: Access to Information, Computer Security, Computer System Design, Higher Education
Ponder, Tim, Comp.; Ropog, Marty, Comp.; Keating, Joseph, Comp. – 1997
This document provides general information on computer viruses, how to help protect a computer network from them, measures to take if a computer becomes infected. Highlights include the origins of computer viruses; virus contraction; a description of some common virus types (File Virus, Boot Sector/Partition Table Viruses, Trojan Horses, and…
Descriptors: Computer Networks, Computer Security, Computer Software, Disk Drives
Petro, Jim – 1999
Survey data obtained in recent audits updated Ohio's local government units' assessment of Year 2000 (Y2K) readiness. The survey was developed with three intended objectives: (1) to provide an accurate assessment of the efforts to remediate the Y2K problem in Ohio's school districts, cities and counties; (2) to identify issues that could affect…
Descriptors: City Government, Computer Security, Counties, Elementary Secondary Education


