NotesFAQContact Us
Collection
Advanced
Search Tips
What Works Clearinghouse Rating
Showing 91 to 105 of 5,467 results Save | Export
Mutchler, Leigh Ann – ProQuest LLC, 2012
The purpose of the present study is to make contributions to the area of behavioral information security in the field of Information Systems and to assist in the improved development of Information Security Policy instructional programs to increase the policy compliance of individuals. The role of an individual's experience in the context of…
Descriptors: Role, Information Security, Online Surveys, Information Systems
Antony, Laljith – ProQuest LLC, 2016
Failing to prevent leaks of confidential and proprietary information to unauthorized users from software applications is a major challenge that companies face. Access control policies defined in software applications with access control mechanisms are unable to prevent information leaks from software applications to unauthorized users. Role-based…
Descriptors: Computer Software, Qualitative Research, Case Studies, Information Security
Handorf, C. Russell – ProQuest LLC, 2016
This study analyzed the meta-data collected from a honeypot that was run by the Federal Bureau of Investigation for a period of 5 years. This analysis compared the use of existing industry methods and tools, such as Intrusion Detection System alerts, network traffic flow and system log traffic, within the Open Source Security Information Manager…
Descriptors: Information Technology, Computer Security, Information Security, Program Effectiveness
Devon Roy Wallace Taylor – ProQuest LLC, 2021
Technology in higher education has dramatically changed how students learn and how business is conducted in today's modern higher education institutions (HEI). Despite this rapid influx of technology in higher education, the integration of institutional technology (IT) leadership into the administrative process around technological innovation has…
Descriptors: Information Technology, Technology Integration, Technological Advancement, Technology Uses in Education
Grama, Joanna Lyn – Institute for Higher Education Policy, 2019
Our current federal postsecondary data system is incomplete and fails to provide today's students with the accurate, timely information that they need to inform their college choices and promote their success. As policymakers consider proposals to improve this federal data system, it is critical that they work in tandem to protect students'…
Descriptors: Privacy, Information Security, Postsecondary Education, Information Systems
Perez, Rafael G. – ProQuest LLC, 2013
The purpose of this quantitative inferential study is to determine the level of correlation between the organizational factors of information security awareness, balanced security processes, and organizational structure with the size of the estimation gap of information security implementations mediated by the end user intentionality. The study…
Descriptors: Information Security, Information Management, Correlation, Administrative Organization
Murphy, Colleen F. – ProQuest LLC, 2018
By 2020, the global need for information security professionals is expected to reach six million and the shortfall in meeting that need is expected to be over one and a half million. Not only is there a shortage of cybersecurity professionals but those who are graduates of a cybersecurity program are not adequately skilled to assume significant…
Descriptors: Instructional Design, Computer Security, Information Security, Labor Force Development
Nyachwaya, Samson – ProQuest LLC, 2013
The research problem addressed in this quantitative correlational study was the inadequacy of sound information security management (ISM) practices in K-12 school districts, despite their increasing ownership of information assets. Researchers have linked organizational and sociotechnical factors to the implementation of information security…
Descriptors: Information Security, Information Management, School Districts, Elementary Secondary Education
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Malybaev, Saken K.; Malaybaev, Nurlan S.; Isina, Botakoz M.; Kenzhekeeva, Akbope R.; Khuangan, Nurbol – International Journal of Environmental and Science Education, 2016
The article presents the results of researches aimed at the creation of automated workplaces for railway transport specialists with the help of intelligent information systems. The analysis of tendencies of information technologies development in the transport network was conducted. It was determined that the most effective approach is to create…
Descriptors: Transportation, Information Systems, Information Management, Information Security
Gleghorn, Gregory D. – ProQuest LLC, 2011
Human capital theory suggests the knowledge, skills, and abilities one obtains through experience, on-the-job training, or education enhances one's productivity. This research was based on human capital theory and promotability (i.e., upward mobility). The research offered in this dissertation shows what effect obtaining information security…
Descriptors: Human Capital, Information Systems, Hypothesis Testing, Vendors
Peer reviewed Peer reviewed
Direct linkDirect link
Collins, Loel; Collins, Dave – Journal of Adventure Education and Outdoor Learning, 2017
This article continues a theme of previous investigations by the authors and examines the focus of in-action reflection as a component of professional judgement and decision-making (PJDM) processes in high-level adventure sports coaching. We utilised a thematic analysis approach to investigate the decision-making practices of a sample of…
Descriptors: Athletic Coaches, Evaluative Thinking, Decision Making, Qualitative Research
Peer reviewed Peer reviewed
Direct linkDirect link
Trabelsi, Zouheir; McCoey, Margaret – International Journal of Information and Communication Technology Education, 2016
Teaching offensive security (ethical hacking) is becoming a necessary component of information security curricula with a goal of developing better security professionals. The offensive security components extend curricula beyond system defense strategies. This paper identifies and discusses the learning outcomes achieved as a result of hands-on…
Descriptors: Ethics, Information Security, Curriculum, Experiential Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Woszczynski, Amy B.; Shade, Sherri – Journal of Information Systems Education, 2010
Much prior research has examined the dearth of women in the IT industry. The purpose of this study is to examine the perceptions of women in IT within the context of information security and assurance. This paper describes results from a study of a relatively new career path to see if there are female-friendly opportunities that have not existed…
Descriptors: Females, Computer Security, Gender Bias, Disproportionate Representation
Moon, Lisa A. – ProQuest LLC, 2017
An individual's choice to share or have control of the sharing or withholding of their personal health information is one of the most significant public policy challenges associated with electronic information exchange. There were four aims of this study. First, to describe predictors of health data sharing preferences of consumers. Second, to…
Descriptors: Public Policy, Information Security, Privacy, Preferences
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  365