NotesFAQContact Us
Collection
Advanced
Search Tips
Showing 1 to 15 of 37 results Save | Export
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Rajab, Majed – ProQuest LLC, 2019
The study of employees' intention to comply with information security policies in higher education is limited. This research thus embarks on an empirical analysis of the factors predicting employees' intention to comply or the lack thereof with respect to their institutions' policies. The theoretical frameworks utilized by the study's model for…
Descriptors: Information Security, Information Policy, Compliance (Psychology), Intention
Stone, Spencer Dwight – ProQuest LLC, 2018
School system personnel are charged with numerous difficult, and sometimes conflicting, tasks. One of those tasks is to teach their students about their free speech rights while also maintaining order in the school building. Sometimes, when students choose to exercise those rights the results put administrators in a difficult situation of trying…
Descriptors: Freedom of Speech, Court Litigation, Student Rights, Educational History
Sanfilippo, Madelyn Rose – ProQuest LLC, 2016
Unequal access to information has significant social and political consequences, and is itself a consequence of sociotechnical systems born of social, cultural, economic, and institutional context. Information is unequally distributed both within and between communities. While many factors that shape information inequality shift subtly over time,…
Descriptors: Access to Information, Information Policy, Policy Analysis, Content Analysis
Waddell, Stanie Adolphus – ProQuest LLC, 2013
Many articles within the literature point to the information security policy as one of the most important elements of an effective information security program. Even though this belief is continually referred to in many information security scholarly articles, very few research studies have been performed to corroborate this sentiment. Doherty and…
Descriptors: Information Security, Higher Education, Information Policy, Statistical Analysis
Lenhart, Laura – ProQuest LLC, 2014
Intellectual property affects an increasingly large range of social life. Despite the breadth of goods and activities affected by intellectual property schemas, policy-makers, legislators, jurists and even many social theorists have a narrow understanding of the basis for instituting intellectual property rights and understanding their limits:…
Descriptors: Cultural Pluralism, Intellectual Property, Social Attitudes, Social Values
Takabi, Hassan – ProQuest LLC, 2013
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Descriptors: Computer System Design, Semantics, Information Security, Information Policy
Edwards, Charles K. – ProQuest LLC, 2013
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…
Descriptors: Governance, Information Security, Models, Compliance (Legal)
Boden, Joshua M. – ProQuest LLC, 2017
As social technologies become more integrated into students' lives, new means of communication have emerged, along with novel problem behaviors with significant consequences for students' well-being. One of these is the sending of sexualized images via cell phone, referred to as "sexting." An understanding of how and why some students…
Descriptors: Social Media, Mass Media Use, Mass Media Effects, Behavior Problems
Harper, Roosevelt – ProQuest LLC, 2014
This research study examined the specific categories of IT control deficiencies and their related effects on financial reporting. The approach to this study was considered non-experimental, an approach sometimes called descriptive. Descriptive statistics are used to describe the basic features of the data in a study, providing simple summaries…
Descriptors: Disclosure, Corporations, Information Technology, Financial Services
Otero, Angel R. – ProQuest LLC, 2014
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…
Descriptors: Information Security, Information Policy, Quality Control, Quality Assurance
Irwin, Jim – ProQuest LLC, 2017
Literature suggested that the mandated filtering required by the Children's Internet Protection Act of 2000 adversely affected the educational system. The literature stated that schools imposed more restrictive filtering than the Act mandated. School systems had the responsibility to ensure that children learn to read, write, and perform…
Descriptors: Secondary School Students, Student Research, Internet, Online Searching
Drake, Perry D. – ProQuest LLC, 2017
This study examined the digital and social media communication practices of nine urban universities including UMSL and compared those to known corporate best practices. The purpose of this study was to (1) research how these universities are using social/digital communications to engage with students and prospective students; (2) compare the…
Descriptors: Social Media, Urban Schools, Best Practices, Universities
Epstein, Dmitry – ProQuest LLC, 2012
This project focuses on the dynamics of the Internet Governance Forum (IGF) as a non-binding multistakeholder debate about information policymaking. Using the theory of structuration and critical discourse analysis, I explore how the nation-state-centric and the internet-community-centric perceptions of authority and approaches to decision-making…
Descriptors: Information Policy, Governance, Internet, Discourse Analysis
Lavender, Anthony L. – ProQuest LLC, 2013
The idea of Open Government is an extension of the Electronic Government Act of 2002 which addresses the accessibility, usability, and preservation of government information. The concept of Open Government has evolved into the open government directive that mandates Executive Departments and Agencies to become more open and transparent while…
Descriptors: Web 2.0 Technologies, Federal Government, Housing, Public Agencies
Previous Page | Next Page ยป
Pages: 1  |  2  |  3