NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 61 to 75 of 1,426 results Save | Export
Williams-Banta, Pauline Elaine – ProQuest LLC, 2019
There is increasing competitive pressure on organizations as they battle frequent, costly, and complex cyber-attacks that seek to undermine the security, and availability of their computing systems. The problem is that people are said to be the weakest link in the security chain, so companies have made significant investments to safeguard their…
Descriptors: Computer Security, Training, Information Security, Knowledge Level
Wynn, Cynthia L. – ProQuest LLC, 2017
An increase in information technology has caused and increased in threats towards information security. Threats are malware, viruses, sabotage from employees, and hacking into computer systems. Organizations have to find new ways to combat vulnerabilities and threats of internal and external threats to protect their information security and…
Descriptors: Information Security, Information Technology, Statistical Analysis, Organizational Culture
Joshua Hanna – ProQuest LLC, 2023
The rise in cyber-related attacks targeting school districts is outpacing cybersecurity readiness, as education institutions in the USA continue to fall victim to online threats (Levin, 2022). The education industry has been slow to react to an increasingly dangerous security landscape, leading many schools to become prime targets and victims of…
Descriptors: Superintendents, Administrator Attitudes, Administrator Role, Computer Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Allen, Ryan M.; Allen, Yang L. – Journal of Comparative and International Higher Education, 2022
The Thousand Talents Plan was an ambitious government initiative to repatriate and/or recruit experts from the global Chinese diaspora, along with some non-Chinese experts. The plan has received much criticism from abroad, accusing it of taking advantage of the open international education sector and facilitating espionage. While the Thousand…
Descriptors: Foreign Countries, Bibliometrics, Research and Development, Talent Development
Grier, Christopher L. – ProQuest LLC, 2009
Web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems using browser-based attacks. Efforts that retrofit existing browsers have had limited success since modern browsers are not designed to withstand attack. To enable more secure web browsing, we design and implement new web browsers from the ground…
Descriptors: Expertise, Metric System, Internet, Web Browsers
Peer reviewed Peer reviewed
Direct linkDirect link
Khan, Manzoor Ahmed; Merabet, Adel; Alkaabi, Shamma; El Sayed, Hesham – Education and Information Technologies, 2022
Computer security competitions have been playing a significant role in encouraging students to get into cybersecurity, as well as enhancing the cybersecurity education system. The level of difficulty of the computer security tasks could be intimidating for most students and learners, one of the reasons there has been a shortage of cybersecurity…
Descriptors: Computer Security, Information Security, Risk, Outcomes of Education
Lee, Heesuk – ProQuest LLC, 2022
Many organizations are providing employee training to raise security awareness as data breaches increase. Organizational digital transformation has accelerated, especially during the COVID-19 outbreak. It has made the technology industry a prime target for cyberattacks. Although more organizations invest in cybersecurity training, data breaches…
Descriptors: Information Technology, Information Security, Employee Attitudes, Knowledge Level
Johnson, Eileen B. – ProQuest LLC, 2019
In an era when school shootings make front page headlines, school security is of major importance to community members, school superintendents, police chiefs, parents, and students. School district leaders and local law enforcement officials generally work together to ensure the safety of their community's children. The nature of the relationships…
Descriptors: School Security, Police School Relationship, Superintendents, Law Enforcement
Warren, Rachel L. – ProQuest LLC, 2022
The teacher shortage in Illinois drives a need for robust teacher education programs. Simultaneously, changes in higher education have forced a dependence on adjunct instructors. While this provides an opportunity to have teacher candidates instructed by talented, accomplished current practitioners, adjuncting is a low-paid, exhausting job with…
Descriptors: Preservice Teacher Education, Adjunct Faculty, College Faculty, Females
Okoye, Stella Ifeyinwa – ProQuest LLC, 2017
Business leaders in Nigeria are concerned about the high rates of business failure and economic loss from security incidents and may not understand strategies for reducing the effects of information security threats on business performance. Guided by general systems theory and transformational leadership theory, the focus of this exploratory…
Descriptors: Information Security, Foreign Countries, Business, Systems Approach
Francois, Michael T. – ProQuest LLC, 2016
Today's organizations rely heavily on information technology to conduct their daily activities. Therefore, their information security systems are an area of heightened security concern. As a result, organizations implement information security programs to address and mitigate that concern. However, even with the emphasis on information security,…
Descriptors: Information Security, Knowledge Level, Policy, Program Effectiveness
Malone, Mac – ProQuest LLC, 2023
We analyze the thesis that a fully immersive gamified learning platform benefits students, improving their enjoyment, time management, and performance by engaging them with the subject matter. We assert that an immersive experience centered around a true game produces better results than exercises with just a few gamified elements (e.g., points,…
Descriptors: Game Based Learning, Teaching Methods, Time Management, Learner Engagement
Mayfield, Mark – ProQuest LLC, 2022
Christian colleges and universities are a small but important subset of higher education institutions. Financial pressures at these private four-year institutions continue to drive institutional leaders towards innovation and new sources of revenue in an attempt to achieve financial security. This study applies resource dependence theory as a lens…
Descriptors: Religious Colleges, Higher Education, Educational Finance, Financial Problems
Beckman, Joseph W. – ProQuest LLC, 2019
Information security practitioners and researchers who possess sufficient depth of conceptual understanding to reconstitute systems after attacks or adapt information security concepts to novel situations are in short supply. Education of new information security professionals with sufficient conceptual depth is one method by which this shortage…
Descriptors: Achievement Gains, Cognitive Processes, Coding, Technology
Waldman, Maya – ProQuest LLC, 2023
Student input is usually limited to expression, while collaboration and leadership increase student engagement and investment. This study sought to collect and elevate the voices of students from a small school for girls in rural East India. Participants included staff and former students. During multiple cycles of data collection, participants…
Descriptors: Foreign Countries, Student Attitudes, Single Sex Schools, Females
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  96