NotesFAQContact Us
Search Tips
What Works Clearinghouse Rating
Showing 91 to 105 of 3,507 results Save | Export
Schaffhauser, Dian – Campus Technology, 2008
Data loss from life's little power calamities may be the most common form of IT disaster any campus can face. According to a 2007 industry association survey(, 82 percent of higher education institutions reporting a disruptive occurrence in the five years prior to the study…
Descriptors: Higher Education, Computer Security, Troubleshooting, Technical Support
Ibrahim, Sara – ProQuest LLC, 2017
The insider security threat causes new and dangerous dimensions in cloud computing. Those internal threats are originated from contractors or the business partners' input that have access to the systems. A study of trustworthiness and transparency might assist the organizations to monitor employees' activity more cautiously on cloud technologies…
Descriptors: Trust (Psychology), Accountability, Regression (Statistics), Computer Security
Fox, Julie – Metropolitan Universities, 2017
Urban universities are uniquely positioned to make powerful and lasting contributions to the grand challenge of food security. To better understand the various dimensions related to the university's role in food systems, this case study explores intentional linkages, significant developments, natural tensions, and emerging impacts at the Ohio…
Descriptors: Systems Development, Food Service, Food, Urban Universities
Dalton-Noblitt, April – American School & University, 2012
In a study conducted among more than 980 American four-year and two-year colleges and universities, including institutions such as the University of Michigan, MIT, UCLA and Columbia, security staff and other administrators identified the five leading goals for their security systems: (1) Preventing unauthorized people from entering their…
Descriptors: School Safety, School Security, Facilities Management, Sexual Harassment
Sayler, Andy – ProQuest LLC, 2016
The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control…
Descriptors: Information Security, Trust (Psychology), Information Systems, Models
Almohri, Hussain M. J. – ProQuest LLC, 2013
Despite the recent advances in systems and network security, attacks on large enterprise networks consistently impose serious challenges to maintaining data privacy and software service integrity. We identify two main problems that contribute to increasing the security risk in a networked environment: (i) vulnerable servers, workstations, and…
Descriptors: Computer Security, Information Security, Risk, Computer Networks
Peer reviewed Peer reviewed
Direct linkDirect link
Jeghal, Adil; Oughdir, Lahcen; Tairi, Hamid – Education and Information Technologies, 2016
The preservation of confidentiality has become a major issue for the majority of applications that process personal information, the sensitivity of this information requires creators to set rules for the sharing and use of access control policies. A great deal of research has already been conducted in educational environments. However, one aspect…
Descriptors: Privacy, Information Security, Role, Educational Environment
Peer reviewed Peer reviewed
PDF on ERIC Download full text
Grover, Mark; Reinicke, Bryan; Cummings, Jeff – Information Systems Education Journal, 2016
As the popularity of Information Technology programs has expanded at many universities, there are a number of questions to be answered from a curriculum standpoint. As many of these programs are either interdisciplinary, or at least exist outside of the usual Computer Science and Information Systems programs, questions of what is appropriate for…
Descriptors: Information Technology, Information Security, Evaluation Methods, Program Evaluation
Nasution, Muhamad Faisal Fariduddin Attar – ProQuest LLC, 2012
This study focuses on the institutionalization of information security in the banking sector. This study is important to pursue since it explicates the internalization of information security governance and practices and how such internalization develops an organizational resistance towards security breach. The study argues that information…
Descriptors: Foreign Countries, Information Security, Banking, Governance
Titus, Aaron – Chronicle of Higher Education, 2008
This article describes five organizational policies and behavior that put personal information in jeopardy. These are: (1) Inadequate security for old data; (2) Shadow systems and unregulated servers; (3) Unsophisticated privacy policies; (4) Improper use of Social Security numbers; and (5) Unsanitized old hard drives. Although the academic…
Descriptors: Privacy, Educational Environment, Internet, Data
Fink, Russell A. – ProQuest LLC, 2010
"End-to-End (E2E)" voting systems provide cryptographic proof that the voter's intention is captured, cast, and tallied correctly. While E2E systems guarantee integrity independent of software, most E2E systems rely on software to provide confidentiality, availability, authentication, and access control; thus, end-to-end integrity is not…
Descriptors: Voting, Confidentiality, Integrity, Computer Software
Bess, Donald Arlo – ProQuest LLC, 2012
Information systems are considered to be a critical and strategic part of most organizations today. Because of this it has become increasingly important to ensure that there is an effective information security program in place protecting those information systems. It has been well established by researchers that the success of an information…
Descriptors: Information Security, Organizational Culture, Case Studies, Information Management
Youngkin, Minu – American School & University, 2012
Proper planning and preventive maintenance can increase school security and return on investment. Preventive maintenance begins with planning. Through careful planning, education institutions can determine what is working and if any equipment, hardware or software needs to be replaced or upgraded. When reviewing a school's safety and security…
Descriptors: School Security, Maintenance, Safety, Prevention
Riggen, Gary – CAUSE/EFFECT, 1989
A good security system enables access and protects information from damage or tampering, but the most important aspects of a security system aren't technical. A security procedures manual addresses the human element of computer security. (MLW)
Descriptors: Access to Information, Computer Networks, Higher Education, Information Networks
Peer reviewed Peer reviewed
Stembridge, Roger E. – CEFP Journal, 1978
Specifications for developing a key controlled security system. (MLF)
Descriptors: Educational Facilities Design, Educational Specifications, Prevention, School Security
Pages: 1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  ...  |  234