Similar Articles |
|
InternetNews February 20, 2009 Richard Adhikari |
Hacker May Have Hit Over 97K at Univ. of Florida Why do people keep launching cyber attacks at the home of the Gators? |
InternetNews February 23, 2010 |
Georgia University Stung By Data Breach More than 170,000 students and faculty members are checking their credit reports this week after a hacker broken into a server at Valdosta State University in Georgia. |
InternetNews October 18, 2010 |
Massive Data Breach Zings Florida University The FBI is investigating another hacking incident that exposed 106,000-plus students' most sensitive information. |
InternetNews March 21, 2005 Tim Gray |
California University Computer System Hacked Attackers gain access to private student data. |
InternetNews December 29, 2009 |
Penn State Breach Continues University Data Woes Latest in a string of security incidents at universities compromises personal information of more than 30,000 students. |
InternetNews September 16, 2005 Tim Gray |
Stolen University Laptop Recovered In San Francisco, authorities track down pilfered laptop that contained tens of thousands of student's personal data. |
T.H.E. Journal September 2003 Stephen P. Forte |
A Pragmatic Approach to High-Tech Security on Campus The challenge is complex, especially considering how decentralized a campus' security, IT and safety systems are today. |
InternetNews August 19, 2005 Jim Wagner |
Colleges Test VoIP Cellphones VeriSign's service lets students and faculty use wireless VoIP on campus and their regular wireless carrier outside. |
InternetNews October 10, 2008 Judy Mottl |
Verizon Mulls Text Fee to Milk a Cash Cow While text messaging is booming, Verizon considers increased prices for bulk delivery. Will it send commercial customers running? |
InternetNews March 29, 2005 Tim Gray |
Another University Suffers Security Breach UC Berkeley joins a growing list of schools losing vital student information to hackers. |
T.H.E. Journal August 2005 Charles D. Fletcher Jr. |
Bolstering a University's Campus Security Smartcard technology helps Delaware State University develop a plan to build a comprehensive identity management system. |
InternetNews August 12, 2010 |
Data Breach Stings Florida Community Colleges A software upgrade turned into a security debacle for some 126,000 students attending six community colleges in Florida. |
T.H.E. Journal January 2005 |
The State of Education Florida Showcases the Best & Brightest Innovations at FETC 2005... Developing the Whole Child: Ocoee Middle School... A Laptop a Day: Manatee County Schools... A National E-Learning Model: Florida Virtual School... |
PC World April 10, 2001 |
Hacking's History From phone phreaks to Web attacks, hacking has been a part of computing for 40 years... |
T.H.E. Journal September 2006 Geoffrey H. Fletcher |
K-12, Meet Higher Ed The two arms of our education system have much to gain in recognizing their common ground. |
T.H.E. Journal September 2002 Steve Burrell |
The New Digital Campus Plymouth State College's solution to the build vs. buy portal debate |
PC World April 2, 2001 Kim Zetter & Andrew Brandt |
How Hackers Hack The tricks hackers use, and what you can do to foil them... |
Salon.com May 21, 2001 David Horowitz |
The triumph of "multicultural" thugs The physical assault on Ann Coulter at Cornell proves that fascism is alive and well on U.S. campuses... |
T.H.E. Journal September 2006 Geoffrey H. Fletcher |
Power Up, Don't Power Down Barring students from using cell phones, MySpace, and other communication technologies once they enter the classroom is the wrong approach. A better move would be integrating those tools into instruction. |
T.H.E. Journal November 2004 Anthony Paustian |
Des Moines Area Community College Utilizes Handhelds for On-the-Go Education As students come to expect more options and greater flexibility in the delivery of course content, schools and colleges need to respond. |
T.H.E. Journal January 2002 Christopher Hons |
Big Ten School in Cyberspace Penn State University's "World Campus" initiative has grown steadily -- not only in terms of its size and scope, but also in the level of respect accorded it... |
T.H.E. Journal August 2004 Ozkan & Gunay |
Minimizing Security Vulnerabilities in High-Tech Classrooms Emerging technologies are quickly becoming part of our daily learning and teaching endeavors in academia, however only a few students, faculty members and administrators are aware of the risks and vulnerabilities that exist in their network operating systems. |