Publication Date
In 2025 | 0 |
Since 2024 | 2 |
Since 2021 (last 5 years) | 3 |
Since 2016 (last 10 years) | 4 |
Since 2006 (last 20 years) | 4 |
Descriptor
Barriers | 4 |
Information Security | 4 |
Training | 4 |
Computer Security | 2 |
Higher Education | 2 |
Access to Information | 1 |
Adoption (Ideas) | 1 |
Audits (Verification) | 1 |
Best Practices | 1 |
Computer Networks | 1 |
Cooperation | 1 |
More ▼ |
Author
Anamaria Maleševic | 1 |
Anamarija Mladinic | 1 |
Criollo-C., Santiago | 1 |
Karlo Ložnjak | 1 |
Livia Puljak | 1 |
Luján-Mora, Sergio | 1 |
Marin Cargo | 1 |
Riley, Stan | 1 |
Stephanie Steelman | 1 |
Zvonimir Koporc | 1 |
Publication Type
Dissertations/Theses -… | 2 |
Journal Articles | 1 |
Reports - Evaluative | 1 |
Reports - Research | 1 |
Speeches/Meeting Papers | 1 |
Education Level
Higher Education | 2 |
Postsecondary Education | 2 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Karlo Ložnjak; Anamaria Maleševic; Marin Cargo; Anamarija Mladinic; Zvonimir Koporc; Livia Puljak – Journal of Academic Ethics, 2024
Personal data protection is an ethical issue. In this study we analyzed how research ethics committees (RECs) and data protection officers (DPOs) handle personal data protection issues in research protocols. We conducted a mixed-methods study. We included heads (or delegated representatives) of RECs and DPOs from universities and public research…
Descriptors: Research Committees, Ethics, Information Security, Foreign Countries
Stephanie Steelman – ProQuest LLC, 2024
Private higher educational institutions are at a high risk of cyber-attacks based on the amount of data they consume about students, their families, donors, faculty, and employees. I determined that there was a gap in the body of knowledge concerning how IT leaders in private higher education secure their information assets. The purpose of this…
Descriptors: Information Technology, Information Security, Computer Security, Higher Education
Riley, Stan – ProQuest LLC, 2022
Cybersecurity best practices were the focus of this work and their use within the public school system. The problem of this study centered on the cybersecurity barriers Texas Independent School Districts faced during implementation. The educational system saw ransomware spread across the state, and without the implementation of best practices,…
Descriptors: School Districts, Computer Security, Information Security, Best Practices
Criollo-C., Santiago; Luján-Mora, Sergio – International Association for Development of the Information Society, 2018
In current education there is a trend called bring your own devices (BYOD), this refers to the policy of use of resources that allows students to bring their own mobile device to use in the classroom. BYOD allows students and educators to take advantage of technological tools to improve learning and instruction. Mobile devices in a BYOD…
Descriptors: Electronic Learning, Handheld Devices, Technology Uses in Education, Educational Trends