Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 9 |
Descriptor
Source
ProQuest LLC | 9 |
Author
AL Faresi, Ahmed | 1 |
Akpabio, Akpabio Enebong Ema | 1 |
Amin, Rohan Mahesh | 1 |
Bess, Donald Arlo | 1 |
Edwards, Gregory | 1 |
Jackson, Larry S. | 1 |
Otero, Angel R. | 1 |
Tirgari, Vesal | 1 |
Wu, Yuehua | 1 |
Publication Type
Dissertations/Theses -… | 9 |
Education Level
Adult Education | 2 |
Higher Education | 1 |
Audience
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Otero, Angel R. – ProQuest LLC, 2014
In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of…
Descriptors: Information Security, Information Policy, Quality Control, Quality Assurance
Bess, Donald Arlo – ProQuest LLC, 2012
Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information…
Descriptors: Information Security, Organizational Culture, Case Studies, Information Management
Akpabio, Akpabio Enebong Ema – ProQuest LLC, 2013
Despite huge growth in hospital technology systems, there remains a dearth of literature examining health care administrator's perceptions of the efficacy of interoperable EHR systems. A qualitative research methodology was used in this multiple-case study to investigate the application of diffusion of innovations theory and the technology…
Descriptors: Medical Services, Case Records, Database Management Systems, Adoption (Ideas)
Tirgari, Vesal – ProQuest LLC, 2010
The phenomenological study explored the lived experiences and perceptions of a purposive sample of 20 IT professionals (managers, engineers, administrators, and analysts) in the state of Virginia, Texas, and Washington DC. The focus of this research study was to learn the perceptions of IT professionals who are or once were in a decision-making…
Descriptors: Information Technology, Professional Personnel, Attitudes, Phenomenology
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients
Wu, Yuehua – ProQuest LLC, 2010
The development and diffusion of information and communication technologies, particularly the internet, creates a worldwide trend of using ICTs and the internet to deliver public services. This new form of electronic administration--e-government--potentially offers great benefits to society in that it can enhance public service efficiency,…
Descriptors: Foreign Countries, Governance, Information Dissemination, Telecommunications
Amin, Rohan Mahesh – ProQuest LLC, 2010
Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…
Descriptors: Electronic Mail, Program Effectiveness, Classification, Statistical Analysis
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change
Jackson, Larry S. – ProQuest LLC, 2009
This dissertation reports the results of an exploratory data analysis investigation of the relationship between the structures used for information organization and access and the associated storage structures within state government websites. Extending an earlier claim that hierarchical directory structures are both the preeminent information…
Descriptors: Investigations, Factor Analysis, Discriminant Analysis, State Government