Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Descriptor
Design Requirements | 2 |
Information Technology | 2 |
Best Practices | 1 |
Compliance (Legal) | 1 |
Computer Software | 1 |
Confidentiality | 1 |
Correlation | 1 |
Data | 1 |
Data Use | 1 |
Governance | 1 |
Identification | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 1 |
Journal Articles | 1 |
Reports - Evaluative | 1 |
Education Level
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Suvineetha Herath; Haywood Gelman; Lisa Mckee – Journal of Cybersecurity Education, Research and Practice, 2023
In today's data-sharing paradigm, personal data has become a valuable resource that intensifies the risk of unauthorized access and data breach. Increased data mining techniques used to analyze big data have posed significant risks to data security and privacy. Consequently, data breaches are a significant threat to individual privacy. Privacy is…
Descriptors: Information Security, Privacy, Data, Standards
Parker, Linda L. – ProQuest LLC, 2016
The study explored the relationship between global software development teams, effective software requirements, and stakeholders' perception of successful software development projects within the field of information technology management. It examined the critical relationship between Global Software Development (GSD) teams creating effective…
Descriptors: Computer Software, Teamwork, Design Requirements, Program Effectiveness