NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 91 to 105 of 138 results Save | Export
Archibald, Fred – Campus Technology, 2008
When it comes to anti-malware protection, today's university IT departments have their work cut out for them. Network managers must walk the fine line between enabling a highly collaborative, non-restrictive environment, and ensuring the confidentiality, integrity, and availability of data and computing resources. This is no easy task, especially…
Descriptors: Academic Freedom, Integrity, Privacy, Computer Security
Bartlett, Thomas – Chronicle of Higher Education, 2007
Cho Seung-Hui was the 23-year-old English major who calmly and methodically gunned down 32 students and faculty members at Virginia Tech last week before killing himself, leaving the campus and the country stunned and sorrowful. Along with the grief have come questions about what, if anything, could have been done to prevent Cho's rampage. Some…
Descriptors: School Safety, Violence, Student Behavior, Antisocial Behavior
Cooper, Sue – Campus Law Enforcement Journal, 2008
Marquette University, established in 1881, is a private Catholic, Jesuit institution located in the heart of Milwaukee, Wisconsin. The university has a student population of more than 11,000 and more than 2,000 faculty and staff. In its effort to continually improve crime prevention and emergency preparedness Marquette's Department of Public…
Descriptors: Emergency Programs, Crime, Safety, Crime Prevention
Peer reviewed Peer reviewed
Direct linkDirect link
McMahon, Patricia Pasky – Journal of American College Health, 2008
Objective: The author introduces a template, the Model Policy for the Prevention and Response to Sexual Assault, to assist institutions of higher education to benchmark campus policy compliance with federal laws directed at sexual assault. The author presents a detailed review of policy criteria recommended by the National Institute of Justice.…
Descriptors: Violence, Sexual Harassment, Sexual Abuse, Federal Legislation
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services
Sammons, Gregory – Campus Law Enforcement Journal, 2008
Many campus law enforcement administrators reach a point where they need to request additional staff. Unless the department is awash in extra funding or is in the wake of a major incident that brought significant attention to current manpower, they're likely fighting an uphill battle for growth. The effectiveness of formulas that analyze the size…
Descriptors: Law Enforcement, Benchmarking, Predictor Variables, Campuses
Mejia, Robin – Chronicle of Higher Education, 2008
The need for colleges to graduate students who understand computer security is growing. The Internet Crime Complaint Center, a partnership of the FBI; the National White Collar Crime Center; and the Bureau of Justice Assistance, in the Department of Justice, reported more than 90,000 crimes in 2007, with reported financial losses of almost…
Descriptors: College Students, Crime Prevention, Computer Security, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Lee, Doohwang; Larose, Robert; Rifon, Nora – Behaviour & Information Technology, 2008
The objective of this study is to develop and test a model of online protection behaviour, particularly regarding the use of virus protection. Hypotheses are proposed concerning the predictors of the intention to engage in virus protection behaviour. Using a survey of 273 college students who use the Internet, a test of the hypotheses is conducted…
Descriptors: Self Efficacy, Intention, Computer Security, Multiple Regression Analysis
Reaves, Brian A. – US Department of Justice (NJ1), 2008
This publication reports on the first survey of campus law enforcement agencies conducted by the Bureau of Justice Statistics since 1994-1995. The report presents data covering the 2004-2005 school year. Agencies serving 4-year U.S. universities and colleges with a fall 2004 enrollment of 2,500 or more, and those serving 2-year public colleges…
Descriptors: Public Schools, School Security, Law Enforcement, Higher Education
Universities UK, 2011
Big ideas for the future is a joint report by Universities UK and Research Councils UK, published as part of the second annual Universities Week campaign. This new report explores the excellent research taking place in UK higher education today and what it will mean for us in 20 years' time. It demonstrates the value of public investment in higher…
Descriptors: Higher Education, Foreign Countries, Investment, Economic Progress
Higher Education Center for Alcohol and Other Drug Abuse and Violence Prevention, 2008
Because alcohol and other drugs are involved in most acts of violence on campus, college and university administrators are under increasing pressure to acknowledge this connection and reduce alcohol consumption on campus. But because alcohol alone does not cause violence, campuses must also address other contributing factors. Since research has…
Descriptors: Violence, Rape, Sexual Abuse, Crime
Howell, Kevin R. – Techniques: Connecting Education and Careers, 2006
This article features an assistant professor of technology who shares his story of near disaster and offers advice for others about protecting their data. The author presents steps that can be taken to prevent unexpected events from destroying data. The author strongly recommends using backup files as a way of securing computer files and data.…
Descriptors: Computer Security, Data, Computer Software, Computer Peripherals
Villano, Matt – Campus Technology, 2008
Colleges and universities can never be too prepared, whether for physical attacks or data security breaches. A quick data slice of over 7,000 US higher ed institutions, using the Office of Postsecondary Education's Campus Security Data Analysis Cutting Tool Website and cutting across public and private two- and four-year schools, reveals some…
Descriptors: School Security, Convergent Thinking, Computer Networks, Computer Security
Peer reviewed Peer reviewed
Direct linkDirect link
Carr, Joetta L.; Ward, Robert L. – NASPA Journal, 2006
In 1999, the American College Health Association (ACHA) adopted a position statement for the Association that addresses acts of violence, bias, and other violations of human rights that have been occurring all too often within or adjacent to college communities. The purpose of this ACHA White Paper is to confront this serious college health issue…
Descriptors: Crime, Violence, College Environment, Crime Prevention
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Lumadi, Mutendwahothe Walter – Contemporary Issues in Education Research, 2008
In 2004 South Africa embarked on a mission of reforming its higher education system, merging and incorporating small universities into larger institutions, and renaming all higher education institutions university. The democratic country's universities and technikons, which were incorporated with others and thus no longer exist, will be mentioned…
Descriptors: Foreign Countries, Educational Change, College Students, Student Behavior
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10