Publication Date
In 2025 | 0 |
Since 2024 | 0 |
Since 2021 (last 5 years) | 0 |
Since 2016 (last 10 years) | 1 |
Since 2006 (last 20 years) | 6 |
Descriptor
Computer Security | 8 |
Computer Software | 8 |
Surveys | 8 |
Information Technology | 3 |
Internet | 3 |
Privacy | 3 |
Risk | 3 |
Administrator Attitudes | 2 |
Computers | 2 |
Higher Education | 2 |
Information Security | 2 |
More ▼ |
Source
ProQuest LLC | 3 |
EDUCAUSE Review | 1 |
Interactive Technology and… | 1 |
International Review of… | 1 |
OCLC Online Computer Library… | 1 |
T.H.E. Journal | 1 |
Author
Brown, Brandon R. | 1 |
Camp, John S. | 1 |
Chen, Yong | 1 |
DeBlois, Peter B. | 1 |
He, Wu | 1 |
Lambert, Joyce C. | 1 |
Lousteau, Carolyn L. | 1 |
Mochetta, Page T. | 1 |
Roumani, Yaman | 1 |
Storey, Tom, Ed. | 1 |
Tjoa, A Min | 1 |
More ▼ |
Publication Type
Journal Articles | 4 |
Dissertations/Theses -… | 3 |
Reports - Descriptive | 2 |
Reports - Research | 2 |
Information Analyses | 1 |
Numerical/Quantitative Data | 1 |
Reports - Evaluative | 1 |
Education Level
Higher Education | 1 |
Kindergarten | 1 |
Postsecondary Education | 1 |
Audience
Laws, Policies, & Programs
Assessments and Surveys
What Works Clearinghouse Rating
Brown, Brandon R. – ProQuest LLC, 2016
Kindergartens through twelfth grade institutions (K-12) are susceptible to unauthorized breaches to the security of their networked systems. These systems house sensitive information for students and staff alike. K-12 organizations face a significant risk for loss of this information that can damage reputation and pose liability. Perpetrators have…
Descriptors: Kindergarten, Elementary Secondary Education, Information Security, Information Networks
Roumani, Yaman – ProQuest LLC, 2012
Software vulnerabilities have been regarded as one of the key reasons for computer security breaches that have resulted in billions of dollars in losses per year (Telang and Wattal 2005). With the growth of the software industry and the Internet, the number of vulnerability attacks and the ease with which an attack can be made have increased. From…
Descriptors: Computer Software, Risk, Computer Security, Information Technology
Chen, Yong; He, Wu – International Review of Research in Open and Distance Learning, 2013
This paper describes a survey of online learning which attempts to determine online learning providers' awareness of potential security risks and the protection measures that will diminish them. The authors use a combination of two methods: blog mining and a traditional literature search. The findings indicate that, while scholars have…
Descriptors: Computer Security, Risk, Online Courses, Electronic Publishing
Wilson, Darrell G. – ProQuest LLC, 2010
Unsolicited bulk email received by business users has increased exponentially in volume and complexity since the introduction of email. However, the factors that influence managers to purchase spam filters have never been fully documented or identified, only assumed. The purpose of this qualitative study was to identify, understand and document…
Descriptors: Research Needs, Small Businesses, Influences, Manufacturing

Lambert, Joyce C.; Lousteau, Carolyn L.; Mochetta, Page T. – T.H.E. Journal, 2001
Discusses the security of computerized test files based on a survey of collegiate educators and offers recommendations to make tests more secure. Highlights include passwords; firewalls; keeping test files offline rather than on a hard drive; encryption; and using software to write over files rather than just deleting them. (LRW)
Descriptors: Computer Security, Computer Software, Higher Education, Surveys
Camp, John S.; DeBlois, Peter B. – EDUCAUSE Review, 2007
The EDUCAUSE Current Issues Committee, whose members review and recommend the set of IT issues to be presented each year, conducted a Web-based survey in December 2006 to identify the five of thirty-one IT issues in each of four areas: (1) issues that are critical for strategic success; (2) issues that are expected to increase in significance; (3)…
Descriptors: Computer Software, Telecommunications, Computer Networks, Computer Uses in Education
Storey, Tom, Ed. – OCLC Online Computer Library Center, Inc., 2007
The practice of using a social network to establish and enhance relationships based on some common ground--shared interests, related skills, or a common geographic location--is as old as human societies, but social networking has flourished due to the ease of connecting on the Web. This OCLC membership report explores this web of social…
Descriptors: Privacy, Foreign Countries, Social Networks, Internet
Weippl, Edgar R.; Tjoa, A Min – Interactive Technology and Smart Education, 2005
Privacy is a requirement that has not received the required attention in most e-learning platforms. Based on the results of a survey we identified weaknesses of e-learning platforms and describe improvements we made in Moodle as a proof-of-concept.
Descriptors: Electronic Learning, Privacy, Improvement, Computer Security