NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 208 results Save | Export
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Sisneros, Lauren; Sponsler, Brian A. – Education Commission of the States, 2016
States and students are increasingly turning to online education programs to provide access to postsecondary education and support credential completion. Recent data indicate that more than 25 percent of postsecondary students take some portion of their coursework online, with 13 percent of students doing so exclusively. Additionally, an…
Descriptors: State Policy, Municipalities, Information Networks, Two Year Colleges
Takabi, Hassan – ProQuest LLC, 2013
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Descriptors: Computer System Design, Semantics, Information Security, Information Policy
Schaffhauser, Dian – Campus Technology, 2013
The pendulum of technology control in higher education has swung away from central IT toward the users. It has become easier for individuals and departments to find their own computing solutions via mobile apps, the cloud, BYOD, web services, and other means. As a result, IT can often find itself out of the loop in certain technology decisions.…
Descriptors: Information Technology, Information Management, Information Policy, Campuses
Edwards, Charles K. – ProQuest LLC, 2013
Information security is a complex issue, which is very critical for success of modern businesses. It can be implemented with the help of well-tested global standards and best practices. However, it has been studied that the human aspects of information security compliance pose significant challenge to its practitioners. There has been significant…
Descriptors: Governance, Information Security, Models, Compliance (Legal)
Baker, Ryan; Twyman, Janet S. – Center on Innovations in Learning, Temple University, 2016
This field report is the ninth in a series produced by the Center on Innovations in Learning's League of Innovators. The series describes, discusses, and analyzes policies and practices that enable personalization in education. This report introduces sessions from the "Conversations with Innovators" event held at Temple University, June…
Descriptors: Information Technology, Technology Uses in Education, Technology Integration, Educational Improvement
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ololube, Nwachukwu Prince; Agbor, Comfort Nkogho; Major, Nanighe Baldwin; Agabi, Chinyere O.; Wali, Worlu I. – International Journal of Education and Development using Information and Communication Technology, 2016
This research is a continuation of a theoretical review that evaluated ICT Policy Outcomes for National Development in relation to Networked Readiness Index (NRI) and the impact it has on knowledge integration and management in higher education institutions in Nigeria. A new dawn in information technology (IT) has initiated new trends in…
Descriptors: Information Technology, Global Approach, Knowledge Management, Higher Education
Harper, Roosevelt – ProQuest LLC, 2014
This research study examined the specific categories of IT control deficiencies and their related effects on financial reporting. The approach to this study was considered non-experimental, an approach sometimes called descriptive. Descriptive statistics are used to describe the basic features of the data in a study, providing simple summaries…
Descriptors: Disclosure, Corporations, Information Technology, Financial Services
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Molnar, Alex; Boninger, Faith – National Education Policy Center, 2015
Computer technology has made it possible to aggregate, collate, analyze, and store massive amounts of information about students. School districts and private companies that sell their services to the education market now regularly collect such information, raising significant issues about the privacy rights of students. Most school districts lack…
Descriptors: Privacy, Information Security, Data, Student Records
Peer reviewed Peer reviewed
Direct linkDirect link
Reyes, Vicente Chua, Jr.; Kheng, Catherine Chua Siew – International Journal of Information and Communication Technology Education, 2015
Using qualitative research inquiry methods, this inquiry attempts to explore how school stakeholders cope with incessant and seemingly endless transformations in schools. The central phenomenon to be studied focuses on how school stakeholders "make sense" of educational reform. In order to do this, an exploratory case study of two target…
Descriptors: Foreign Countries, Stakeholders, Information Policy, Educational Policy
Irwin, Jim – ProQuest LLC, 2017
Literature suggested that the mandated filtering required by the Children's Internet Protection Act of 2000 adversely affected the educational system. The literature stated that schools imposed more restrictive filtering than the Act mandated. School systems had the responsibility to ensure that children learn to read, write, and perform…
Descriptors: Secondary School Students, Student Research, Internet, Online Searching
Boninger, Faith; Molnar, Alex – Commercialism in Education Research Unit, 2016
Digital technologies used by marketers continue to evolve. Sophisticated and personalized, they help ensure that today's children and adolescents are constantly connected and available to advertisers wherever they may roam. Moreover, because digital technologies enable extensive personalization, they amplify opportunities for marketers to take…
Descriptors: Privacy, Information Security, Student Records, Data Collection
Office of Postsecondary Education, US Department of Education, 2012
The Technological Innovation and Cooperation for Foreign Information Access (TICFIA) Program supports projects focused on developing innovative technologies for accessing, collecting, organizing, preserving, and disseminating information from foreign sources to address the U.S.' teaching and research needs in international education and foreign…
Descriptors: Higher Education, Libraries, Innovation, Federal Aid
Peer reviewed Peer reviewed
Direct linkDirect link
Jaeger, Paul T.; Bertot, John Carlo; Gorham, Ursula – Library Quarterly, 2013
Public libraries are heavily affected by political and policy-making processes that shape the funding, activities, and roles of libraries in society, with the explosion of information policy decisions in the past two decades significantly increasing the responsibilities of libraries while also increasing limitations on their activities. Research…
Descriptors: Information Policy, Public Libraries, Information Science, Information Science Education
Previous Page | Next Page ยป
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  14