Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 0 |
Since 2006 (last 20 years) | 6 |
Descriptor
Access to Information | 6 |
Computer System Design | 6 |
Information Security | 6 |
Information Policy | 3 |
Information Technology | 3 |
Automation | 2 |
Computer Interfaces | 2 |
Information Management | 2 |
Privacy | 2 |
Academic Discourse | 1 |
Academic Freedom | 1 |
More ▼ |
Publication Type
Dissertations/Theses -… | 3 |
Reports - Descriptive | 2 |
Books | 1 |
Collected Works - General | 1 |
Journal Articles | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Elementary Secondary Education | 1 |
Audience
Location
Canada | 1 |
United States | 1 |
Laws, Policies, & Programs
Health Insurance Portability… | 1 |
Assessments and Surveys
What Works Clearinghouse Rating
Canadian Association of University Teachers, 2015
Increasingly, university and college administrators are contracting out their institutions' operational information technology (IT) needs. Specifically, this means moving from an IT system with a server based at the institution with an in house IT support staff to a cloud based system outside the institution where most of the staff resources are…
Descriptors: Outsourcing, Information Technology, Universities, Privacy
Takabi, Hassan – ProQuest LLC, 2013
Cloud computing paradigm has gained tremendous momentum and generated intensive interest. Although security issues are delaying its fast adoption, cloud computing is an unstoppable force and we need to provide security mechanisms to ensure its secure adoption. In this dissertation, we mainly focus on issues related to policy management and access…
Descriptors: Computer System Design, Semantics, Information Security, Information Policy
Vaniea, Kami – ProQuest LLC, 2012
Managing access to shared digital information, such as photographs and documents. is difficult for end users who are accumulating an increasingly large and diverse collection of data that they want to share with others. Current policy-management solutions require a user to proactively seek out and open a separate policy-management interface when…
Descriptors: Access to Information, Information Security, Computer Interfaces, Computer System Design
Alawneh, John – School Business Affairs, 2012
Whenever thousands of users need to connect seamlessly to a vast number of online resources, identity management (IDM) becomes a critical capability. Although several products on the market can deliver a robust identity management solution, there is no one-size-fits-all. Identity management requires business processes and a supporting…
Descriptors: Access to Information, Automation, Information Networks, Information Policy
Huang, Kuo Hung, Ed. – InTech, 2011
Digital library is commonly seen as a type of information retrieval system which stores and accesses digital content remotely via computer networks. However, the vision of digital libraries is not limited to technology or management, but user experience. This book is an attempt to share the practical experiences of solutions to the operation of…
Descriptors: Computer Networks, Publishing Industry, Electronic Libraries, Educational Resources
AL Faresi, Ahmed – ProQuest LLC, 2011
Current research in health care lacks a systematic investigation to identify and classify various sources of threats to information privacy when sharing health data. Identifying and classifying such threats would enable the development of effective information security risk monitoring and management policies. In this research I put the first step…
Descriptors: Identification, Information Security, Compliance (Legal), Patients