NotesFAQContact Us
Collection
Advanced
Search Tips
Assessments and Surveys
What Works Clearinghouse Rating
Showing 1 to 15 of 25 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Trumbach, Cherie C.; Payne, Dinah M.; Walsh, Kenneth – Industry and Higher Education, 2023
Cybersecurity threats have been intensifying and becoming more diverse. Social engineering can enable or enhance these technical attacks. This interplay between technical attacks and social engineering, when used, makes every employee, manager and board member a part of the security infrastructure of an organization. As such, it is incumbent upon…
Descriptors: Computer Security, Information Security, Business Education, Higher Education
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Fezzey, Tyler; Batchelor, John H.; Burch, Gerald F.; Reid, Randall – Journal of Cybersecurity Education, Research and Practice, 2023
The scope and breadth of the COVID-19 pandemic were unprecedented. This is especially true for business continuity and the related area of cybersecurity. Historically, business continuity and cybersecurity are viewed and researched as separate fields. This paper synthesizes the two disciplines as one, thus pointing out the need to address both…
Descriptors: Information Security, Computer Security, COVID-19, Pandemics
Peer reviewed Peer reviewed
Direct linkDirect link
Ianioglo, Alina; Polajeva, Tatjana – International Journal of Learning and Change, 2017
In present conditions of instability of the environment, entrepreneurs assume the most of the business risks. In this regard, problems of ensuring the economic security become particularly important. The comprehensive system of ensuring the economic security of enterprise was worked out and the results are presented in the article. This system is…
Descriptors: Entrepreneurship, Business, Economic Climate, Economic Factors
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Zhitlukhina, Olga G.; Rakutko, Svetlana Y.; Berezhnova, Elena I.; Selezneva, Elena Y.; Belik, Elena V.; Shalaeva, Nina I.; Denisevich, Elena I.; Belik, Natalia V.; Saenko, Zhanna E.; Sultanova, Alina A. – International Journal of Environmental and Science Education, 2016
The paper deals with problems of the country's economic security and entities, timely resolution of which influences directly the country's national security. The cornerstone of successful existence of any country, especially the Russian Federation, during such complicated period is the presence of effective national economic security system.…
Descriptors: Deception, Economic Climate, Financial Problems, National Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Ladwig, Christine; Schwieger, Dana; Clayton, Donald – Information Systems Education Journal, 2017
The "Piranha Solution"® is a complex and valuable integrated chemical supply inventory management system protected as a trade secret by its asset holder, the Confluence Corporation. The "Piranha" program is the lifeblood of the corporation's growth and success in the chemical supply industry. A common definition of "trade…
Descriptors: Information Systems, Information Security, Management Systems, Knowledge Management
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Yates, David J.; Frydenberg, Mark; Waguespack, Leslie J.; McDermott, Isabelle; OConnell, Jake; Chen, Frankie; Babb, Jeffry S. – Information Systems Education Journal, 2019
The importance of updating, expanding and improving what is taught in cybersecurity curricula is increasing as the security threat landscape becomes more dangerous, breaches become more frequent, and the number of deployed Internet of Things (IoT) devices, known for their security challenges, grows exponentially. This paper argues that a profile…
Descriptors: Information Security, Computer Security, Curriculum Design, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Zhao, Jensen; Zhao, Sherry Y. – Journal of Education for Business, 2015
While the growing popularity of social media has brought many benefits to society, it has also resulted in privacy and security threats. The authors assessed the security and vulnerability of 50 social media sites. The findings indicate that most sites (a) posted privacy and security policies but only a minority stated clearly their execution of…
Descriptors: Social Media, Information Security, Information Policy, Privacy
Peer reviewed Peer reviewed
Direct linkDirect link
Spears, Janine L.; Parrish, James L., Jr. – Journal of Information Systems Education, 2013
This teaching case introduces students to a relatively simple approach to identifying and documenting security requirements within conceptual models that are commonly taught in systems analysis and design courses. An introduction to information security is provided, followed by a classroom example of a fictitious company, "Fun &…
Descriptors: Information Security, Computer Security, Information Technology, Internet
Peer reviewed Peer reviewed
Direct linkDirect link
Kritzinger, Elmarie – Africa Education Review, 2017
Technology is playing an increasingly significant role in people's lives. They use it for work, education, business and social activities; however, their use of different kinds of information communication technologies (ICTs) puts their personal information at risk. It is essential for everyone using ICTs to be aware of the potential information…
Descriptors: School Culture, Foreign Countries, Computer Security, Safety
Peer reviewed Peer reviewed
Direct linkDirect link
Doscher, Stephanie Paul – Journal of Cases in Educational Leadership, 2008
As instructional leaders, principals often make curriculum decisions that balance their community's need for knowledge with the nation's need for knowledge workers. Across the country, school administrators are searching for funding and effective means of infusing more technology, foreign language learning, and global perspectives instruction into…
Descriptors: National Security, Principals, School Administration, Instructional Leadership
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Jensen, Bradley K.; Guynes, Carl S.; Nyaboga, Andrew – American Journal of Business Education, 2009
Given the magnitude of real and potential losses, both private and public employers increasingly expect graduates of management information systems (MIS) programs to understand information security concepts. The infrastructure requirements for the course includes setting up a secure laboratory environment to accommodate the development of viruses…
Descriptors: Graduate Students, Management Information Systems, Information Security, Concept Teaching
Peer reviewed Peer reviewed
Direct linkDirect link
McLendon, Michael K.; Hearn, James C. – Teachers College Record, 2010
Background/Context: Every state in the nation has legal requirements, state "sunshine laws," to ensure accountability and fairness in institutions receiving state funds and operating under state authority. These laws have come to significantly influence the ways in which the business of higher education is conducted. Purpose/Objective/Research…
Descriptors: State Legislation, Access to Information, Information Policy, Higher Education
Peer reviewed Peer reviewed
Direct linkDirect link
Council, Chip – Community College Journal, 2005
Now it is increasingly critical that community college leaders become involved in network security and partner with their directors of information technology (IT). Network security involves more than just virus protection software and firewalls. It involves vigilance and requires top executive support. Leaders can help their IT directors to…
Descriptors: Community Colleges, Risk, Computer Security, Information Technology
Fischer, Karin – Chronicle of Higher Education, 2008
Three reports on last April's shootings left Virginia Tech under a mountain of recommendations--roughly 400 in all. So far the university has dealt with some of the most significant ones. Virginia Tech established an emergency-notification system, created a team to assess at-risk students and employees, and hired additional police officers and…
Descriptors: School Safety, Violence, School Security, Crisis Management
Schrader, Andrew – School Business Affairs, 2011
On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…
Descriptors: Electronic Mail, School Districts, Information Technology, Computer Security
Previous Page | Next Page »
Pages: 1  |  2