Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 4 |
Since 2016 (last 10 years) | 10 |
Since 2006 (last 20 years) | 11 |
Descriptor
Data Collection | 11 |
Information Security | 11 |
Information Technology | 8 |
Privacy | 5 |
Computer Security | 4 |
Data Analysis | 3 |
Guidelines | 3 |
Risk | 3 |
Competence | 2 |
Decision Making | 2 |
Employee Attitudes | 2 |
More ▼ |
Source
ProQuest LLC | 11 |
Author
Publication Type
Dissertations/Theses -… | 11 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Aurelia Raquel Rodriguez Mandani – ProQuest LLC, 2024
In the context of the rapid expansion of web-integrated technologies, there exists a need for a thorough comprehension of data privacy, emphasizing risk mitigation and the nuanced governance of private data within organizational and regulatory frameworks. Given the rise of privacy regulations such as the GDPR and CCPA, it has become important for…
Descriptors: Information Technology, Information Security, Compliance (Psychology), Privacy
Rene David Chacon – ProQuest LLC, 2021
With the increasing data security awareness of mobile crowdsensing (MCS) participants, smartphone app developers are continually developing technical security protections, but with little consideration on human behaviors. Information technology (IT) advancements seen in the introduction of homomorphic encryption and privacy preserving…
Descriptors: Graduate Students, Student Participation, Handheld Devices, Computer Oriented Programs
Minara Mordecai – ProQuest LLC, 2022
Advances in educational technology have led to unprecedented accumulation of student information, but there is limited research to inform school practices in protecting student data. At a minimum, school districts must remain in compliance with increasingly complex state and federal laws on student privacy. Moreover, increased cyberattacks on K-12…
Descriptors: Information Security, Privacy, Technological Advancement, Educational Innovation
Barthur, Ashrith – ProQuest LLC, 2016
There are two essential goals of this research. The first goal is to design and construct a computational environment that is used for studying large and complex datasets in the cybersecurity domain. The second goal is to analyse the Spamhaus blacklist query dataset which includes uncovering the properties of blacklisted hosts and understanding…
Descriptors: Computer Security, Information Security, Data Collection, Internet
Ilci, Ahmet – ProQuest LLC, 2020
Privacy and surveillance are pervasive words not only in higher education but also in many areas in our life. We use and hear them often while shopping online, reading the news, or checking the policies and terms of websites. In this study, I highlight the challenges of data collection and surveillance in education, specifically, in online…
Descriptors: Privacy, Information Security, Case Studies, Undergraduate Students
Li, Weifeng – ProQuest LLC, 2017
Social media analytics is a critical research area spawned by the increasing availability of rich and abundant online user-generated content. So far, social media analytics has had a profound impact on organizational decision making in many aspects, including product and service design, market segmentation, customer relationship management, and…
Descriptors: Social Media, Information Security, Role, Crime
Fazlioglu, Muge – ProQuest LLC, 2017
This dissertation examines the risk-based approach to privacy and data protection and the role of information sensitivity within risk management. Determining what information carries the greatest risk is a multi-layered challenge that involves balancing the rights and interests of multiple actors, including data controllers, data processors, and…
Descriptors: Risk, Privacy, Information Security, Risk Management
Nilsen, Richard K. – ProQuest LLC, 2017
Organizational information system users (OISU) that are victimized by cyber threats are contributing to major financial and information losses for individuals, businesses, and governments. Moreover, it has been argued that cybersecurity competency is critical for advancing economic prosperity and maintaining national security. The fact remains…
Descriptors: Computer Security, Information Security, Knowledge Level, Competence
Bradley, Sapora L. – ProQuest LLC, 2017
The increasing implementation of technology applications into the workplace has substantiated the need for adept professionals who can manage HR technology for employees and provide data about the organization. For some companies, these professionals are found within the human resources department. These information systems professionals combine…
Descriptors: Human Resources, Professional Personnel, Information Systems, Qualitative Research
Koh, Byungwan – ProQuest LLC, 2011
The advent of information technology has enabled firms to collect significant amounts of data about individuals and mine the data for developing their strategies. Profiling of individuals is one common use of data collected about them. It refers to using known or inferred information to categorize the type of an individual and to tailor specific…
Descriptors: Screening Tests, Program Effectiveness, Information Technology, Data Collection