NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
ACT Assessment1
What Works Clearinghouse Rating
Showing 31 to 37 of 37 results Save | Export
Villano, Matt – Campus Technology, 2008
In this article, the author offers six best practices for physical and data security convergence. These are: (1) assess the cable plant; (2) choose wisely; (3) be patient; (4) engineer for high availability; (5) test the converged network to make sure it works; and (6) don't forget the humans.
Descriptors: Computer Security, Best Practices, Guidelines, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
McMullen, Karen D.; Kane, Laura Townsend – Public Services Quarterly, 2008
In the wake of recent tragedies, campus security has become a hot issue nationwide. Campus libraries, as traditional meeting spots for varied groups of people, are particularly vulnerable to security issues. Safety and security problems that can occur at any library generally include theft, vandalism, arson, antisocial behavior, and assaults on…
Descriptors: Colleges, Campuses, Academic Libraries, School Security
Peer reviewed Peer reviewed
Direct linkDirect link
McNeal, Laura R. – Journal of Personnel Evaluation in Education, 2007
The purpose of this study was to explore what factors served as impediments to institutional efforts to comply with Clery Act guidelines through the perceptions of campus law administrators. Statistical analyses were performed on data collected from an online survey, which was distributed to members of the International Association of Campus Law…
Descriptors: Institutional Cooperation, Compliance (Legal), Federal Legislation, Universities
Peer reviewed Peer reviewed
Direct linkDirect link
Corn, Michael – EDUCAUSE Quarterly, 2007
Many security professionals choose the career because of an interest in the technology of security. Few realize the degree to which a contemporary security office interacts with law enforcement agencies (LEAs) such as the FBI and state, local, and campus police. As the field of information security has matured, the language of risk management is…
Descriptors: Trust (Psychology), School Security, Police, Risk Management
Kennedy, Mike – American School & University, 2006
Education administrators have many tools available to them as they strive to establish a safe climate for learning, but no one strategy or piece of equipment is a magic solution that keeps potential trouble beyond the campus boundaries. Creating and maintaining a safe and secure school environment requires a balance of many strategies: (1)…
Descriptors: Student Behavior, Safety Education, Safety, Educational Environment
Peer reviewed Peer reviewed
Direct linkDirect link
Anderson, Alicia – EDUCAUSE Quarterly, 2006
No university seems immune to cyber attacks. For many universities, such events have served as wake-up calls to develop a comprehensive information security and privacy strategy. This is no simple task, however. It involves balancing a culture of openness with a need for security and privacy. Security and privacy are not the same, and the…
Descriptors: School Security, Colleges, Privacy, Computer Security
Pressey, James – PEPNet-Northeast, 2001
If a campus has students who are deaf or hard of hearing, its Public Safety department needs to become aware of some basic information about deafness in order to serve those students well. Public Safety officers may interact with deaf students in a variety of situations: (1) Reporting a theft; (2) Emergency medical situations; (3) Reporting items…
Descriptors: Partial Hearing, Deafness, Deaf Interpreting, Assistive Technology
« Previous Page | Next Page
Pages: 1  |  2  |  3