NotesFAQContact Us
Collection
Advanced
Search Tips
Showing all 9 results Save | Export
Herbert C. Peluzzo Jr. – ProQuest LLC, 2022
K-12 school districts are on the frontlines of cyber warfare, with many districts across America to become victims of phishing, social engineering, malware, and ransomware attacks. As a result, many districts have been forced to cease operations for extended periods of time, pay costly ransoms, and endure the embarrassment of having highly…
Descriptors: Elementary Secondary Education, Administrators, Teachers, Computer Security
Emilio J. Del Riego – ProQuest LLC, 2024
This qualitative descriptive research study was conducted to explore the impact that transformational leadership and innovation have in creating a cybersecurity conscious organizational culture. The value of having a cybersecurity conscious organizational culture through transformational leadership and innovation is described in line with higher…
Descriptors: Transformational Leadership, Information Security, Computer Security, Organizational Culture
Stevenson, Gregory V. – ProQuest LLC, 2017
Rationale: Former President Barack Obama's $3.9 trillion for the 2015 fiscal year budget request included a $2.9 billion investment in Science, Technology, Engineering and Math (STEM) education. Research then showed that the national spending for cybersecurity has exceeded $10.7 billion in the 2015 fiscal year. Nonetheless, the number of…
Descriptors: Computer Security, Qualitative Research, Case Studies, STEM Education
Skallos, Maryly K. – ProQuest LLC, 2014
With funding cuts, reduced enrollments, and meeting a presidential initiative, Michigan community colleges need to find ways in which they can continue to provide quality education at an affordable price. Consumerization of information technology (IT) has been proposed to meet the technological needs of the community college. There is little…
Descriptors: Community Colleges, Qualitative Research, Information Technology, Administrators
Tanque, Marcus M. – ProQuest LLC, 2012
The research conducted in this study inquires about Information Technology (IT) managers' and executives' attitudes, beliefs, and knowledge on Cloud Computing (CC) security. The study evaluated how these factors affect IT managers' and executives' willingness to adopt CC solutions in their organizations. Confidentiality,…
Descriptors: Information Technology, Administrators, Adoption (Ideas), Administrator Attitudes
Balogun, Shereef Adewale – ProQuest LLC, 2013
Information technology (IT) outsourcing is a practical way to transfer information technology by industries of different firms. The problem occurs when companies outsource services to domestic and international data centers as network security issues arise. This leads to competition between companies causing the size of the company to become more…
Descriptors: Outsourcing, Information Technology, Risk, Organization Size (Groups)
Spears, Phillip Dewitt – ProQuest LLC, 2013
New technology development has researchers inundated with a plethora of data security issues linked to cyber attacks and hackers' ability to transmogrify their techniques. The present research focused on the information technology managing officers' (ITMOs') level of education, size of organization, organization's industry, and effect they have on…
Descriptors: Information Security, Administrators, Educational Attainment, Organization Size (Groups)
Reifers, Andrew – ProQuest LLC, 2010
Network security is a large and complex problem being addressed by multiple communities. Nevertheless, current theories in networking security appear to overestimate network administrators' ability to understand network access control lists (NACLs), providing few context specific user analyses. Consequently, the current research generally seems to…
Descriptors: Visualization, Administrators, Computer Networks, Information Technology
Chithambo, Loyce Maosa – ProQuest LLC, 2011
Since the availability of remote access technology, most companies have adopted telecommuting as part of business operations. Although some research has identified policies and procedures when individuals telecommute, limited research exists about existing policies and procedures for telecommuters. The purpose of this qualitative descriptive…
Descriptors: Information Technology, Teleworking, Information Security, Computer Security