Studying Skilled Users
How You Should STUDY SKILLED USERS
Watch Your Class
See what devices they use. Ask what theyre being used for. Evaluate.
Track connections by Internet Protocol address. Watch usage, in progress.
Let them know that monitoring is legal and possible. Establish penalties for unauthorized use of the network.
The best security comes from getting intelligent input from affected users.
Heres a look at how universities are coping with technologies that can hamper academic or network performance, if used improperly. Bandwidth: Northeastern University uses "traffic shapers" to prevent hogging. This software designates bandwidth for certain activities. Although Northeastern cant monitor content, it can designate certain activities, such as downloading a research paper, as more favorable than downloading a movie. For instance, no more than 5 percent of bandwidth can be used at any one time to connect to file sharing services such as Kazaa.