Skip to Content Skip to Content

Campus & Community

Reset All Filters
4087 Results
When good computer users do bad things

When good computer users do bad things

In a perfect world, employees would always follow company online privacy and security protocols. They’d safeguard passwords, heed warnings about invalid or obsolete programming, and only use websites with valid SSL certificates.

Jacquie Posey

Penn poised to roll out more modern data-management systems

Penn poised to roll out more modern data-management systems

In 1979, Penn administrators began deploying a series of systems that would digitally manage a triad of University arteries—Student Billing & Receivables, Academic Records & Registration, and Financial Aid.

Maria Zankey

Penn and ADL Partner for Holocaust Education

Penn and ADL Partner for Holocaust Education

Penn and the Anti-Defamation League (ADL) of Philadelphia presented a half-day workshop to introduce teachers and future teachers to “Echoes and Reflections,” a multimedia Holocaust education curriculum designed by the ADL and the USC Shoah Foundation Institute.

Jacquie Posey

Computer Users Circumvent Password Security With Workarounds, Penn Led Study Shows

Computer Users Circumvent Password Security With Workarounds, Penn Led Study Shows

When workers and organizations circumvent computer passwords and security rules, they unwittingly open the door to hackers, according to a study co-authored by Ross Koppel, an adjunct professor of sociology at the University of Pennsylvania.

Jacquie Posey