Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 1 |
Since 2016 (last 10 years) | 2 |
Since 2006 (last 20 years) | 7 |
Descriptor
Computer Security | 7 |
Federal Government | 7 |
Information Technology | 4 |
Certification | 3 |
National Security | 3 |
Governance | 2 |
Information Security | 2 |
Information Systems | 2 |
Internet | 2 |
Interviews | 2 |
Qualifications | 2 |
More ▼ |
Source
ProQuest LLC | 7 |
Author
Bates, Justin D. | 1 |
Clark, Kenneth Norman | 1 |
Cusak, Austin | 1 |
Edwards, Gregory | 1 |
Miles, Tracy L. | 1 |
Noah, Philip D., Jr. | 1 |
Pierce, Steven Russell | 1 |
Publication Type
Dissertations/Theses -… | 7 |
Education Level
Adult Education | 1 |
Audience
Location
District of Columbia | 1 |
Maryland | 1 |
Virginia | 1 |
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Cusak, Austin – ProQuest LLC, 2023
This study sought to understand how cybersecurity professionals in technical U.S. Federal Government (USFG) positions transition into first-time cybersecurity leader roles. The study also sought to explore which leadership competencies were used/developed in this transition and how those leaders gained the knowledge and skills to perform their…
Descriptors: Computer Security, Information Security, Government Employees, Federal Government
Bates, Justin D. – ProQuest LLC, 2017
The goal of this research was to discover a list of changes that can be applied to IT security certifications to enhance the day-to-day capabilities of IT security professionals. Background: IT security professionals are often required to obtain certifications that do not adequately prepare them for the full scope of work that will be necessary…
Descriptors: Information Technology, Information Security, Professional Personnel, Certification
Clark, Kenneth Norman – ProQuest LLC, 2012
A "commons" is the conventional term that describes a widely accessible and shared resource, such as an ocean, open rangeland, a public park, or public portions of the Internet, which is difficult to exclude or limit use once naturally provided or humanly produced. Ruin of a commons can result when individuals use the resource recklessly…
Descriptors: Mixed Methods Research, Internet, Governance, Federal Government
Noah, Philip D., Jr. – ProQuest LLC, 2013
The purpose of this research project was to explore what the core factors are that play a role in the development of the smart-grid. This research study examined The Energy Independence and Security Act (EISA) of 2007 as it pertains to the smart-grid, the economic and security effects of the smart grid, and key factors for its success. The…
Descriptors: Meta Analysis, Computer Security, Federal Legislation, Case Studies
Miles, Tracy L. – ProQuest LLC, 2009
One of the most significant challenges faced by government officials today is securing information systems to make them more resilient to attack from increasingly complex challenges from cyber-criminals, state-sponsored groups, and other threats. Over the years, the federal government has developed and implemented Certification and Accreditation…
Descriptors: Information Systems, Information Technology, Federal Government, Accreditation (Institutions)
Pierce, Steven Russell – ProQuest LLC, 2009
Information technology (IT) certifiers evaluate risk and develop mitigations ensuring IT infrastructures remain protected within acceptable levels of operation, which if not properly maintained can potentially result in loss of life within Department of Defense (DoD) and federal environments. This qualitative phenomenological exploratory study…
Descriptors: Data Analysis, Certification, Internet, Information Technology
Edwards, Gregory – ProQuest LLC, 2011
Security incidents resulting from human error or subversive actions have caused major financial losses, reduced business productivity or efficiency, and threatened national security. Some research suggests that information system security frameworks lack emphasis on human involvement as a significant cause for security problems in a rapidly…
Descriptors: Strategic Planning, National Security, Information Systems, Social Change