Publication Date
In 2025 | 0 |
Since 2024 | 6 |
Since 2021 (last 5 years) | 22 |
Since 2016 (last 10 years) | 53 |
Since 2006 (last 20 years) | 102 |
Descriptor
Information Security | 102 |
Information Technology | 102 |
Computer Security | 29 |
Computer Software | 17 |
Privacy | 16 |
Risk | 16 |
Internet | 14 |
Qualitative Research | 14 |
Models | 13 |
Information Systems | 12 |
Professional Personnel | 12 |
More ▼ |
Source
ProQuest LLC | 102 |
Author
Publication Type
Dissertations/Theses -… | 102 |
Education Level
Higher Education | 16 |
Postsecondary Education | 12 |
Adult Education | 2 |
Secondary Education | 2 |
Elementary Education | 1 |
Elementary Secondary Education | 1 |
Two Year Colleges | 1 |
Audience
Location
United States | 3 |
India | 2 |
Tennessee | 2 |
Appalachia | 1 |
California | 1 |
Cameroon | 1 |
China | 1 |
European Union | 1 |
Florida | 1 |
Illinois (Urbana) | 1 |
Michigan | 1 |
More ▼ |
Laws, Policies, & Programs
Health Insurance Portability… | 2 |
Assessments and Surveys
Multifactor Leadership… | 1 |
What Works Clearinghouse Rating
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Michael Christopher Waranowicz – ProQuest LLC, 2024
Public school districts are frequently targeted by cybercriminals to gain access to a wealth of under-protected sensitive data. As a result, information technology (IT) leaders in public school districts must implement measures to maintain the security and confidentiality of sensitive data collected and stored by their schools. This qualitative…
Descriptors: Computer Security, Program Implementation, Public Schools, School Districts
Ali Nusair – ProQuest LLC, 2023
As the digital revolution unfolds, individuals are increasingly transforming their traditional homes into smart homes, adopting semi- and fully automated smart devices. This transformative shift, fueled by advancements in information technology, presents vast social and economic opportunities. Despite the burgeoning number of smart devices in the…
Descriptors: Internet, Information Technology, Information Security, Training Methods
II Patrick Michael Damon – ProQuest LLC, 2023
The purpose of this study was to examine the effects of gamified training in cybersecurity concepts on individuals not employed in information technology roles compared to traditional pieces of training. As the world becomes increasingly connected technologically, so too do the cyber vulnerabilities increase, and it is essential for all types of…
Descriptors: Information Technology, Information Security, Computer Security, Gamification
JoEllen Renee Price – ProQuest LLC, 2022
This dissertation is aimed at assisting higher education leaders, IT professionals, and administrators in understanding data security risks that institutions face and how employee understanding and behavior can increase or reduce data security risk. The study aims to measure the relationship between financial aid administrator data security…
Descriptors: Information Security, Information Technology, Student Records, Higher Education
Michael David McCormick – ProQuest LLC, 2022
Information security and information privacy, while related, encompass different details, especially for higher education institutions. Data security, focused on protecting data from malicious attacks, does not go as far as data privacy, focused on how data is shared, used, and communicated with others. Prior literature and research suggest higher…
Descriptors: Higher Education, Governance, Privacy, Information Systems
Frank Xavier Gearhart – ProQuest LLC, 2024
Digital systems are pervasive in modern societies -- augmenting personal and commercial driving, detecting cancer, and exploiting transitory events in financial markets. Attacks on these systems are growing in number, sophistication, and impact. Current cyber defenses are proving inadequate against some of these attacks. Cyber defense tools that…
Descriptors: Artificial Intelligence, Information Security, Man Machine Systems, Natural Language Processing
Aurelia Raquel Rodriguez Mandani – ProQuest LLC, 2024
In the context of the rapid expansion of web-integrated technologies, there exists a need for a thorough comprehension of data privacy, emphasizing risk mitigation and the nuanced governance of private data within organizational and regulatory frameworks. Given the rise of privacy regulations such as the GDPR and CCPA, it has become important for…
Descriptors: Information Technology, Information Security, Compliance (Psychology), Privacy
Joshua Lee Brunty – ProQuest LLC, 2023
The shortage of qualified cybersecurity professionals is a growing concern in the information technology industry, and the rapid growth of the field exacerbates this shortage. Employers express concern over the shortage of hands-on, practical skills and problem-solving abilities among recent graduates, leading to the "cybersecurity skills…
Descriptors: Student Attitudes, Experiential Learning, Information Security, Information Technology
Garrett J. Stevens – ProQuest LLC, 2023
Faculty and staff working from home during the COVID pandemic were presented with new challenges in adapting to emergency remote teaching, as well as new and expanded cyber security threats. Changes to course delivery, remote access from public locations, and the potential of faculty and staff storing confidential educational records on…
Descriptors: COVID-19, Pandemics, College Faculty, School Personnel
Stephen John Elliot – ProQuest LLC, 2023
Organizations face many cybersecurity threats. Among those threats, social engineering attacks such as phishing stand out as a constant and costly struggle. The primary tools for combating social engineering are information security policy (ISP) and security awareness training (SAT), which seek to inform users of the threat of social engineering,…
Descriptors: Space Sciences, Safety Education, Compliance (Legal), Information Security
Rene Ekoteson – ProQuest LLC, 2024
Cyberattacks pose a significant threat to university institutions as universities increasingly rely on computer networks to conduct day-to-day business activities. University information technology (IT) leaders are concerned about the increasing level of cyberattacks because these attacks can result in the loss of sensitive data, identity theft,…
Descriptors: Prevention, Information Technology, Information Security, Computer Security
Courtney C. Stephens – ProQuest LLC, 2023
Many organizations are utilizing learning management e-learning (LMS-eLearning) systems for conducting employee professional skill advancement. To increase the likelihood of successful e-learning, management must prepare the workforce to accept the LMS-eLearning security training application. This study investigated whether anticipated ease of…
Descriptors: Learning Management Systems, Employees, Job Skills, Skill Development
Lee, Heesuk – ProQuest LLC, 2022
Many organizations are providing employee training to raise security awareness as data breaches increase. Organizational digital transformation has accelerated, especially during the COVID-19 outbreak. It has made the technology industry a prime target for cyberattacks. Although more organizations invest in cybersecurity training, data breaches…
Descriptors: Information Technology, Information Security, Employee Attitudes, Knowledge Level
Devon Roy Wallace Taylor – ProQuest LLC, 2021
Technology in higher education has dramatically changed how students learn and how business is conducted in today's modern higher education institutions (HEI). Despite this rapid influx of technology in higher education, the integration of institutional technology (IT) leadership into the administrative process around technological innovation has…
Descriptors: Information Technology, Technology Integration, Technological Advancement, Technology Uses in Education