Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 2 |
Descriptor
Crime | 5 |
Vandalism | 5 |
Computer Security | 3 |
Higher Education | 3 |
Computer Networks | 2 |
Law Enforcement | 2 |
State Legislation | 2 |
Access to Computers | 1 |
Access to Information | 1 |
Cheating | 1 |
College Students | 1 |
More ▼ |
Source
Chronicle of Higher Education | 5 |
Author
Young, Jeffrey R. | 2 |
Blumenstyk, Goldie | 1 |
Carlson, Scott | 1 |
Fischman, Josh | 1 |
Wanat, Thomas | 1 |
Wilson, David L. | 1 |
Publication Type
Journal Articles | 5 |
Reports - Descriptive | 5 |
Education Level
Higher Education | 2 |
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Young, Jeffrey R. – Chronicle of Higher Education, 2008
An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…
Descriptors: Electronic Mail, Computer Security, Colleges, Crime
Fischman, Josh; Carlson, Scott; Young, Jeffrey R. – Chronicle of Higher Education, 2008
Technology decisions should not be made solely in some geeky corner of the campus, but should be central to strategic planning and involve top academic leaders. Campus-technology leaders traded tales from the trenches and plenty of advice during the two-day Technology Forum, held in Tampa, Florida in February 2008. Ohio University responded to a…
Descriptors: Strategic Planning, Information Technology, Educational Technology, Information Services
Blumenstyk, Goldie – Chronicle of Higher Education, 1991
Twenty-two states now specifically outlaw such activities as entering a research laboratory without permission, releasing animals, disrupting experiments, and removing documents and photographs related to research. Several expand the definition of criminal activity to include videotaping or photographing facility interiors. Penalties vary by…
Descriptors: Crime, Higher Education, Laboratories, Laboratory Animals
Wanat, Thomas – Chronicle of Higher Education, 1997
A Duke University (North Carolina) student witnessing vandalism to the National Collegiate Athletic Association's (NCAA) World Wide Web site and a University of Massachusetts, Amherst student, both studying computer science, have contributed substantially to the identification of a computer hacker destroying the NCAA site. The students' rapid…
Descriptors: College Students, Computer Science, Computer Security, Crime
Wilson, David L. – Chronicle of Higher Education, 1993
Campus computing officials are working to improve security against computer hackers because of concerns about privacy, accidental or intentional damage to systems, and impediments to legitimate system users. Increasingly, public law enforcement authorities are called in but do not always take the problem seriously. (MSE)
Descriptors: Cheating, Computer Networks, Crime, Federal Legislation