Publication Date
In 2025 | 0 |
Since 2024 | 1 |
Since 2021 (last 5 years) | 2 |
Since 2016 (last 10 years) | 3 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 6 |
Computer Uses in Education | 6 |
Foreign Countries | 3 |
Governance | 2 |
Information Security | 2 |
Information Technology | 2 |
Internet | 2 |
Risk Management | 2 |
Administrative Policy | 1 |
Administrators | 1 |
Barriers | 1 |
More ▼ |
Source
ProQuest LLC | 6 |
Author
Alexander, Charles | 1 |
Flinn, Michael Bradley | 1 |
Ganesh Iyer | 1 |
Mekdeci, Kelly Broyles | 1 |
Nancy Plumer | 1 |
Skallos, Maryly K. | 1 |
Publication Type
Dissertations/Theses -… | 6 |
Education Level
Higher Education | 4 |
Postsecondary Education | 3 |
Elementary Secondary Education | 2 |
Two Year Colleges | 1 |
Audience
Location
India | 1 |
Maryland | 1 |
Michigan | 1 |
Peru | 1 |
South America | 1 |
United States | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Nancy Plumer – ProQuest LLC, 2024
The study helped investigate Peruvian Higher Education Institutions' (PHEI) security posture and how the adoption of modern technology enhanced the operational processes to reduce cyber threats. The purpose of the research was based on research questions to assess access controls effectiveness, infrastructure security gaps, emerging technology…
Descriptors: Computer Security, Universities, Foreign Countries, Computer Uses in Education
Ganesh Iyer – ProQuest LLC, 2021
This quantitative, cross-sectional study investigated the relationship between the concern for information privacy (CFIP) of Indian undergraduate students and their willingness to provide personal information to transact on the Internet (PPIT). The study also examined the mediating effects of internet trust and perceived internet privacy risk on…
Descriptors: Foreign Countries, Undergraduate Students, Privacy, Computer Security
Alexander, Charles – ProQuest LLC, 2018
Encryption based ransomware operates by iterating through all files with specific extensions on the computer and mutating them into an unusable form. The mutation, in many cases, can only be reversed if the user pays the operator of the ransomware a fee to get their files back. K-12 school districts have fallen victim to rampant malware as a…
Descriptors: Computer Security, School Districts, Elementary Secondary Education, Computer Uses in Education
Skallos, Maryly K. – ProQuest LLC, 2014
With funding cuts, reduced enrollments, and meeting a presidential initiative, Michigan community colleges need to find ways in which they can continue to provide quality education at an affordable price. Consumerization of information technology (IT) has been proposed to meet the technological needs of the community college. There is little…
Descriptors: Community Colleges, Qualitative Research, Information Technology, Administrators
Flinn, Michael Bradley – ProQuest LLC, 2009
With privacy concerns growing on a daily basis, it is important to understand how college students guard their personally identifiable information. Despite the students' perceived readiness and several studies on the topic, it is not fully understood what personally identifiable information college students are sharing via online social networks…
Descriptors: College Students, Internet, Social Networks, Grade Point Average
Mekdeci, Kelly Broyles – ProQuest LLC, 2011
United States schools and American Overseas (A/OS) schools depend upon educational technology (ET) to support business operations and student learning experiences. Schools rely upon administrative software, on-line course modules, information databases, digital communications systems, and many other ET processes. However, ET's fragility compared…
Descriptors: Foreign Countries, Educational Technology, Computer Uses in Education, Institutional Mission