NotesFAQContact Us
Collection
Advanced
Search Tips
Publication Date
In 20250
Since 20240
Since 2021 (last 5 years)0
Since 2016 (last 10 years)0
Since 2006 (last 20 years)1
Publication Type
Journal Articles2
Opinion Papers2
Reports - Descriptive1
Education Level
Higher Education1
Audience
Location
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Showing all 2 results Save | Export
Peer reviewed Peer reviewed
Oravec, Jo Ann – Business Education Forum, 2000
Risk management training cannot prevent hazards, but can help students learn to deal with them more efficiently. A risk-assessment and risk-communication approach to dealing with computer problems can be applied in the business classroom. (JOW)
Descriptors: Business Education, Computer Security, Risk Management, Training
Peer reviewed Peer reviewed
Direct linkDirect link
Oblinger, Diana G.; Hawkins, Brian L. – EDUCAUSE Review, 2006
Seeing an institution's name in the headlines for a security breach may be among a CIO's-- and a president's--worst nightmares. Whether the breached data involves social security numbers, credit card accounts, clinical records, or research, this is bad news. Federal agencies that provide research funding may lose confidence in data integrity,…
Descriptors: Information Technology, Computer Security, Integrity, Risk Management