NotesFAQContact Us
Search Tips
What Works Clearinghouse Rating
Showing 61 to 75 of 3,474 results Save | Export
Peer reviewed Peer reviewed
Direct linkDirect link
Ayyagari, Ramakrishna; Figueroa, Norilyz – Journal of Information Systems Education, 2017
Information Security issues are one of the top concerns of CEOs. Accordingly, information systems education and research have addressed security issues. One of the main areas of research is the behavioral issues in Information Security, primarily focusing on users' compliance to information security policies. We contribute to this literature by…
Descriptors: Information Security, Evidence, Information Science Education, Information Policy
Whitfield, Christina; Armstrong, John; Weeden, Dustin – State Higher Education Executive Officers, 2019
Since 2010, the State Higher Education Executive Officers Association (SHEEO) has periodically administered the "Strong Foundations" survey, which documents the content, structure, and effective use of state postsecondary student unit record systems (PSURSs). This report highlights the results of the fourth administration of the survey,…
Descriptors: Postsecondary Education, Information Systems, Student Records, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Greenberg, David F.; Roush, Jeffrey B. – Evaluation Review, 2009
Poisson and negative binomial regression methods are used to analyze the monthly time series data to determine the effects of introducing an integrated security management system including closed-circuit television (CCTV), door alarm monitoring, proximity card access, and emergency call boxes to a large privately-owned complex of apartment…
Descriptors: Crime, Crime Prevention, Public Housing, Program Effectiveness
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Mayes, Robin; Natividad, Gloria; Spector, J. Michael – Education Sciences, 2015
In 1972, Edsger Dijkstra claimed that computers had only introduced the new problem of learning to use them effectively. This is especially true in 2015 with regard to powerful new educational technologies. This article describes the challenges that 21st century educational technologists are, and will be, addressing as they undertake the effective…
Descriptors: Educational Technology, Barriers, Technology Integration, Educational Opportunities
Attai, Linnette – Educational Leadership, 2019
With the growth of tech-driven instructional possibilities, school systems have an increasingly urgent responsibility for schools to continuously assess and improve student data-protection practices. Attai, a project director for the Consortium for School Networking, outlines a program designed to help education leaders master the fundamentals of…
Descriptors: Privacy, Information Security, Administrator Responsibility, Data Collection
Peer reviewed Peer reviewed
Direct linkDirect link
Sauls, Jeff; Gudigantala, Naveen – Journal of Information Systems Education, 2013
Managing IT security and assurance is a top priority for organizations. Aware of the costs associated with a security or privacy breach, organizations are constantly vigilant about protecting their data and IT systems. In addition, organizations are investing heavily in IT resources to keep up with the challenges of managing their IT security and…
Descriptors: Computer Security, College Graduates, Labor Force, Computer Science Education
Peer reviewed Peer reviewed
Direct linkDirect link
Finkel, Ed – Community College Journal, 2019
Community colleges aren't quite as high on the list of hackers and scammers as institutions like banks, hospitals and four-year research universities, yet the institutional and personal data stored on their servers and in the online cloud can be valuable, so they need to lock down their data like any other entity. This requires a combination of…
Descriptors: Information Security, Computer Security, Campuses, Community Colleges
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Black, Michael; Chapman, Debra; Clark, Angela – Information Systems Education Journal, 2018
The Enhanced Virtual Laboratory (EVL) is the product of a Department of Defense grant to enhance outreach, research, and education for cyber security. Through web-based laboratories, EVL allows users to remotely experience interactive content with virtual machines inside a modern web browser providing constructivism-based, student-centered,…
Descriptors: Computer Security, Computer Simulation, Laboratories, Internet
Wiebe, Sean; MacDonald, Craig – Canadian Journal of Education, 2014
Reflecting on a previous study of teachers' narratives, this epistolary conversation follows ideas of intensification and complexity that emerged in the authors' return to the narrative accounts. Their conversation highlights representations of teaching as a struggle for recognition, personal happiness, and security-all within a system of…
Descriptors: Personal Narratives, Teacher Attitudes, Teaching Conditions, Foreign Countries
Charif, Abdul Rahim – ProQuest LLC, 2017
Secure Information Systems (SIS) design paradigms have evolved in generations to adapt to IS security needs. However, modern IS are still vulnerable and are far from secure. The development of an underlying IS cannot be reduced to "technological fixes" neither is the design of SIS. Technical security cannot ensure IS security.…
Descriptors: Information Security, Information Systems, Design, Action Research
Nyachwaya, Samson – ProQuest LLC, 2013
The research problem addressed in this quantitative correlational study was the inadequacy of sound information security management (ISM) practices in K-12 school districts, despite their increasing ownership of information assets. Researchers have linked organizational and sociotechnical factors to the implementation of information security…
Descriptors: Information Security, Information Management, School Districts, Elementary Secondary Education
Peer reviewed Peer reviewed
Direct linkDirect link
He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang – Journal of Information Systems Education, 2014
In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…
Descriptors: Information Security, Case Studies, Teaching Methods, Active Learning
Peer reviewed Peer reviewed
Direct linkDirect link
Alshammari, Mohammad T.; Qtaish, Amjad – Journal of Information Technology Education: Research, 2019
Aim/Purpose: Effective e-learning systems need to incorporate student characteristics such as learning style and knowledge level in order to provide a more personalized and adaptive learning experience. However, there is a need to investigate how and when to provide adaptivity based on student characteristics, and more importantly, to evaluate its…
Descriptors: Electronic Learning, Cognitive Style, Knowledge Level, Individualized Instruction
Harris, Mark A. – ProQuest LLC, 2010
Information security research states that corporate security policy and information security training should be socio-technical in nature and that corporations should consider training as a primary method of protecting their information systems. However, information security policies and training are predominately technical in nature. In addition,…
Descriptors: Computer Security, Job Training, Video Technology, Technical Support
DeShield, Leslie A. – ProQuest LLC, 2017
Research conducted by Tech Pro (2014) indicated that the Bring Your Own Device (BYOD) concept is gaining momentum with 74% of organizations already having some BYOD program or planning to implement one. While BYOD offers several benefits, it also presents challenges that concern information technology leaders and information security managers.…
Descriptors: Program Implementation, Technology Uses in Education, Handheld Devices, Telecommunications
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  232